Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
03VPFXH490.exe

Overview

General Information

Sample name:03VPFXH490.exe
renamed because original name is a hash value
Original sample name:f9a6811d7a9d5e06d73a68fc729ce66c.exe
Analysis ID:1574851
MD5:f9a6811d7a9d5e06d73a68fc729ce66c
SHA1:c882143d5fde4b2e7edb5a9accb534ba17d754ef
SHA256:c583d0a367ecffa74b82b78116bbb04b7c92bed0300ed1c3adc4ef3250fbb9cc
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 03VPFXH490.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\03VPFXH490.exe" MD5: F9A6811D7A9D5E06D73A68FC729CE66C)
    • powershell.exe (PID: 7448 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7684 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '03VPFXH490.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7956 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3940 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["45.141.26.234"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
03VPFXH490.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    03VPFXH490.exeJoeSecurity_XWormYara detected XWormJoe Security
      03VPFXH490.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        03VPFXH490.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x81a4:$s6: VirtualBox
        • 0x8102:$s8: Win32_ComputerSystem
        • 0x8b52:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x8bef:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x8d04:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x8800:$cnc4: POST / HTTP/1.1
        SourceRuleDescriptionAuthorStrings
        C:\ProgramData\Java Update (32bit).exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          C:\ProgramData\Java Update (32bit).exeJoeSecurity_XWormYara detected XWormJoe Security
            C:\ProgramData\Java Update (32bit).exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              C:\ProgramData\Java Update (32bit).exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x81a4:$s6: VirtualBox
              • 0x8102:$s8: Win32_ComputerSystem
              • 0x8b52:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x8bef:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x8d04:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x8800:$cnc4: POST / HTTP/1.1
              SourceRuleDescriptionAuthorStrings
              00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                  00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x7fa4:$s6: VirtualBox
                  • 0x7f02:$s8: Win32_ComputerSystem
                  • 0x8952:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x89ef:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x8b04:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x8600:$cnc4: POST / HTTP/1.1
                  00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                    00000000.00000002.2941379266.0000000002E8A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                      Click to see the 2 entries
                      SourceRuleDescriptionAuthorStrings
                      0.0.03VPFXH490.exe.a50000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                        0.0.03VPFXH490.exe.a50000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                          0.0.03VPFXH490.exe.a50000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                            0.0.03VPFXH490.exe.a50000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                            • 0x81a4:$s6: VirtualBox
                            • 0x8102:$s8: Win32_ComputerSystem
                            • 0x8b52:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                            • 0x8bef:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                            • 0x8d04:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                            • 0x8800:$cnc4: POST / HTTP/1.1

                            System Summary

                            barindex
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\03VPFXH490.exe", ParentImage: C:\Users\user\Desktop\03VPFXH490.exe, ParentProcessId: 7316, ParentProcessName: 03VPFXH490.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', ProcessId: 7448, ProcessName: powershell.exe
                            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\03VPFXH490.exe", ParentImage: C:\Users\user\Desktop\03VPFXH490.exe, ParentProcessId: 7316, ParentProcessName: 03VPFXH490.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', ProcessId: 7448, ProcessName: powershell.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\03VPFXH490.exe", ParentImage: C:\Users\user\Desktop\03VPFXH490.exe, ParentProcessId: 7316, ParentProcessName: 03VPFXH490.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', ProcessId: 7448, ProcessName: powershell.exe
                            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\03VPFXH490.exe, ProcessId: 7316, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update (32bit).lnk
                            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\03VPFXH490.exe", ParentImage: C:\Users\user\Desktop\03VPFXH490.exe, ParentProcessId: 7316, ParentProcessName: 03VPFXH490.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe', ProcessId: 7448, ProcessName: powershell.exe
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-13T17:45:56.562516+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:00.823486+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:01.474616+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:06.474257+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:08.743008+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:11.491415+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:16.516874+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:21.547241+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:21.952041+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:26.671858+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:30.889531+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:31.532464+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:34.549061+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:36.529959+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:41.532108+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:46.538787+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:49.102934+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:51.543235+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:56.556107+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:00.606699+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:00.912470+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:01.565888+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:06.575947+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:10.734326+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:11.583663+010028528701Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-13T17:46:08.774353+010028529231Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP
                            2024-12-13T17:46:21.548935+010028529231Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP
                            2024-12-13T17:46:34.550780+010028529231Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP
                            2024-12-13T17:47:00.608558+010028529231Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP
                            2024-12-13T17:47:10.735067+010028529231Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-13T17:46:00.823486+010028528741Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:46:30.889531+010028528741Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            2024-12-13T17:47:00.912470+010028528741Malware Command and Control Activity Detected45.141.26.2347000192.168.2.449737TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2024-12-13T17:46:07.663515+010028559241Malware Command and Control Activity Detected192.168.2.44973745.141.26.2347000TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: 03VPFXH490.exeAvira: detected
                            Source: C:\ProgramData\Java Update (32bit).exeAvira: detection malicious, Label: TR/Spy.Gen
                            Source: 03VPFXH490.exeMalware Configuration Extractor: Xworm {"C2 url": ["45.141.26.234"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
                            Source: C:\ProgramData\Java Update (32bit).exeReversingLabs: Detection: 78%
                            Source: 03VPFXH490.exeReversingLabs: Detection: 78%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: C:\ProgramData\Java Update (32bit).exeJoe Sandbox ML: detected
                            Source: 03VPFXH490.exeJoe Sandbox ML: detected
                            Source: 03VPFXH490.exeString decryptor: 45.141.26.234
                            Source: 03VPFXH490.exeString decryptor: 7000
                            Source: 03VPFXH490.exeString decryptor: <123456789>
                            Source: 03VPFXH490.exeString decryptor: <Xwormmm>
                            Source: 03VPFXH490.exeString decryptor: Xworm
                            Source: 03VPFXH490.exeString decryptor: USB.exe
                            Source: 03VPFXH490.exeString decryptor: %ProgramData%
                            Source: 03VPFXH490.exeString decryptor: Java Update (32bit).exe
                            Source: 03VPFXH490.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: 03VPFXH490.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_919e9136cc8d4791\gdiplus.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\MSVFW32.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_919e9136cc8d4791Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\en-US\avicap32.dll.muiJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\en-US\MSVFW32.dll.muiJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\system32\wbem\en-US\wmiutils.dll.muiJump to behavior

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 45.141.26.234:7000 -> 192.168.2.4:49737
                            Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 45.141.26.234:7000 -> 192.168.2.4:49737
                            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49737 -> 45.141.26.234:7000
                            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49737 -> 45.141.26.234:7000
                            Source: Malware configuration extractorURLs: 45.141.26.234
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            Source: global trafficTCP traffic: 192.168.2.4:49737 -> 45.141.26.234:7000
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                            Source: Joe Sandbox ViewASN Name: SPECTRAIPSpectraIPBVNL SPECTRAIPSpectraIPBVNL
                            Source: unknownDNS query: name: ip-api.com
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownTCP traffic detected without corresponding DNS query: 45.141.26.234
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficDNS traffic detected: DNS query: ip-api.com
                            Source: 03VPFXH490.exe, Java Update (32bit).exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                            Source: powershell.exe, 00000001.00000002.1775096450.0000023A10074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860716635.0000020C99A54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1981436782.0000019590074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                            Source: powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                            Source: powershell.exe, 00000001.00000002.1761890443.0000023A00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C89C09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                            Source: 03VPFXH490.exe, 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1761890443.0000023A00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C899E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: powershell.exe, 00000001.00000002.1761890443.0000023A00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C89C09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                            Source: powershell.exe, 00000004.00000002.1810793540.0000020C89955000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwpkiops/Docs/Repository.htm0
                            Source: powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                            Source: powershell.exe, 0000000B.00000002.2194033435.0000024B2E830000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                            Source: powershell.exe, 00000001.00000002.1761890443.0000023A00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C899E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                            Source: powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                            Source: powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                            Source: powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                            Source: powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                            Source: powershell.exe, 00000001.00000002.1782938063.0000023A760B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.m
                            Source: powershell.exe, 00000001.00000002.1775096450.0000023A10074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860716635.0000020C99A54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1981436782.0000019590074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            Source: 03VPFXH490.exe, XLogger.cs.Net Code: KeyboardLayout
                            Source: Java Update (32bit).exe.0.dr, XLogger.cs.Net Code: KeyboardLayout

                            Operating System Destruction

                            barindex
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: 01 00 00 00 Jump to behavior

                            System Summary

                            barindex
                            Source: 03VPFXH490.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\ProgramData\Java Update (32bit).exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD17710_2_00007FFD9BAD1771
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD66620_2_00007FFD9BAD6662
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD06100_2_00007FFD9BAD0610
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD58B60_2_00007FFD9BAD58B6
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD94200_2_00007FFD9BAD9420
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BB82E111_2_00007FFD9BB82E11
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BB630E97_2_00007FFD9BB630E9
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9BB82E1C11_2_00007FFD9BB82E1C
                            Source: 03VPFXH490.exe, 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamex.exe4 vs 03VPFXH490.exe
                            Source: 03VPFXH490.exeBinary or memory string: OriginalFilenamex.exe4 vs 03VPFXH490.exe
                            Source: 03VPFXH490.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: 03VPFXH490.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: C:\ProgramData\Java Update (32bit).exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 03VPFXH490.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 03VPFXH490.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 03VPFXH490.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: Java Update (32bit).exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: Java Update (32bit).exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: Java Update (32bit).exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 03VPFXH490.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: 03VPFXH490.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: Java Update (32bit).exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: Java Update (32bit).exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/20@1/2
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update (32bit).lnkJump to behavior
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7964:120:WilError_03
                            Source: C:\Users\user\Desktop\03VPFXH490.exeMutant created: \Sessions\1\BaseNamedObjects\2XLzSYLZvUJjDK3V
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5936:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7456:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7692:120:WilError_03
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                            Source: 03VPFXH490.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: 03VPFXH490.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: 03VPFXH490.exeReversingLabs: Detection: 78%
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile read: C:\Users\user\Desktop\03VPFXH490.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\03VPFXH490.exe "C:\Users\user\Desktop\03VPFXH490.exe"
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '03VPFXH490.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '03VPFXH490.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: scrrun.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: linkinfo.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: ntshrui.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: cscapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: avicap32.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: msvfw32.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeSection loaded: windowscodecs.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Users\user\Desktop\03VPFXH490.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                            Source: Java Update (32bit).lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\ProgramData\Java Update (32bit).exe
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                            Source: 03VPFXH490.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: 03VPFXH490.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                            Data Obfuscation

                            barindex
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: 03VPFXH490.exe, Messages.cs.Net Code: Memory
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: Java Update (32bit).exe.0.dr, Messages.cs.Net Code: Memory
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD00BD pushad ; iretd 0_2_00007FFD9BAD00C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B99D2A5 pushad ; iretd 1_2_00007FFD9B99D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB00BD pushad ; iretd 1_2_00007FFD9BAB00C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BB82316 push 8B485F93h; iretd 1_2_00007FFD9BB8231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B99D2A5 pushad ; iretd 4_2_00007FFD9B99D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9BABC2C5 push ebx; iretd 4_2_00007FFD9BABC2DA
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9BAB00BD pushad ; iretd 4_2_00007FFD9BAB00C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9BB82316 push 8B485F93h; iretd 4_2_00007FFD9BB8231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9B97D2A5 pushad ; iretd 7_2_00007FFD9B97D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA97354 push eax; iretd 7_2_00007FFD9BA97361
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA972D4 push ds; iretd 7_2_00007FFD9BA97302
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA971FB push ss; iretd 7_2_00007FFD9BA97272
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA9858C push edi; iretd 7_2_00007FFD9BA9859A
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA985CC push edi; iretd 7_2_00007FFD9BA9859A
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA9854C push esi; iretd 7_2_00007FFD9BA9857A
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BA900BD pushad ; iretd 7_2_00007FFD9BA900C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9BB62316 push 8B485F95h; iretd 7_2_00007FFD9BB6231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9B99D2A5 pushad ; iretd 11_2_00007FFD9B99D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9BAB00BD pushad ; iretd 11_2_00007FFD9BAB00C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9BB82316 push 8B485F93h; iretd 11_2_00007FFD9BB8231B
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\ProgramData\Java Update (32bit).exeJump to dropped file
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\ProgramData\Java Update (32bit).exeJump to dropped file

                            Boot Survival

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update (32bit).lnkJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update (32bit).lnkJump to behavior

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: C:\Users\user\Desktop\03VPFXH490.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                            Source: 03VPFXH490.exe, 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                            Source: 03VPFXH490.exe, Java Update (32bit).exe.0.drBinary or memory string: SBIEDLL.DLLINFO
                            Source: C:\Users\user\Desktop\03VPFXH490.exeMemory allocated: F90000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeMemory allocated: 1AE40000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\Desktop\03VPFXH490.exeWindow / User API: threadDelayed 9796Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6348Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3447Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7448Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2141Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7463Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2194Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7658
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1988
                            Source: C:\Users\user\Desktop\03VPFXH490.exe TID: 6700Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7768Thread sleep count: 7448 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7768Thread sleep count: 2141 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8044Thread sleep count: 7463 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8028Thread sleep count: 2194 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8076Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2692Thread sleep count: 7658 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 416Thread sleep count: 1988 > 30
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7136Thread sleep time: -4611686018427385s >= -30000s
                            Source: C:\Users\user\Desktop\03VPFXH490.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_919e9136cc8d4791\gdiplus.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\MSVFW32.dllJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_919e9136cc8d4791Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\en-US\avicap32.dll.muiJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\SYSTEM32\en-US\MSVFW32.dll.muiJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeFile opened: C:\Windows\system32\wbem\en-US\wmiutils.dll.muiJump to behavior
                            Source: Java Update (32bit).exe.0.drBinary or memory string: vmware
                            Source: 03VPFXH490.exe, 00000000.00000002.2978470207.000000001BD7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess information queried: ProcessInformationJump to behavior

                            Anti Debugging

                            barindex
                            Source: C:\Users\user\Desktop\03VPFXH490.exeCode function: 0_2_00007FFD9BAD6E61 CheckRemoteDebuggerPresent,0_2_00007FFD9BAD6E61
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess queried: DebugPortJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Users\user\Desktop\03VPFXH490.exeMemory allocated: page read and write | page guardJump to behavior

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '03VPFXH490.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe'Jump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeQueries volume information: C:\Users\user\Desktop\03VPFXH490.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\Desktop\03VPFXH490.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Users\user\Desktop\03VPFXH490.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                            Lowering of HIPS / PFW / Operating System Security Settings

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            Source: 03VPFXH490.exe, 00000000.00000002.2978470207.000000001BDF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                            Source: C:\Users\user\Desktop\03VPFXH490.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2941379266.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 03VPFXH490.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.03VPFXH490.exe.a50000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2941379266.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 03VPFXH490.exe PID: 7316, type: MEMORYSTR
                            Source: Yara matchFile source: C:\ProgramData\Java Update (32bit).exe, type: DROPPED
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                            Windows Management Instrumentation
                            1
                            DLL Side-Loading
                            1
                            DLL Side-Loading
                            11
                            Disable or Modify Tools
                            1
                            Input Capture
                            2
                            File and Directory Discovery
                            Remote Services11
                            Archive Collected Data
                            1
                            Ingress Tool Transfer
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            Scheduled Task/Job
                            1
                            Scheduled Task/Job
                            11
                            Process Injection
                            1
                            Deobfuscate/Decode Files or Information
                            LSASS Memory23
                            System Information Discovery
                            Remote Desktop Protocol1
                            Input Capture
                            1
                            Encrypted Channel
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts1
                            PowerShell
                            2
                            Registry Run Keys / Startup Folder
                            1
                            Scheduled Task/Job
                            11
                            Obfuscated Files or Information
                            Security Account Manager541
                            Security Software Discovery
                            SMB/Windows Admin SharesData from Network Shared Drive1
                            Non-Standard Port
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                            Registry Run Keys / Startup Folder
                            2
                            Software Packing
                            NTDS1
                            Process Discovery
                            Distributed Component Object ModelInput Capture2
                            Non-Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                            DLL Side-Loading
                            LSA Secrets151
                            Virtualization/Sandbox Evasion
                            SSHKeylogging12
                            Application Layer Protocol
                            Scheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                            Masquerading
                            Cached Domain Credentials1
                            Application Window Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                            Virtualization/Sandbox Evasion
                            DCSync1
                            System Network Configuration Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                            Process Injection
                            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574851 Sample: 03VPFXH490.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 32 ip-api.com 2->32 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 18 other signatures 2->44 8 03VPFXH490.exe 14 6 2->8         started        signatures3 process4 dnsIp5 34 45.141.26.234, 49737, 7000 SPECTRAIPSpectraIPBVNL Netherlands 8->34 36 ip-api.com 208.95.112.1, 49730, 80 TUT-ASUS United States 8->36 30 C:\ProgramData\Java Update (32bit).exe, PE32 8->30 dropped 46 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->46 48 Protects its processes via BreakOnTermination flag 8->48 50 Bypasses PowerShell execution policy 8->50 52 3 other signatures 8->52 13 powershell.exe 23 8->13         started        16 powershell.exe 23 8->16         started        18 powershell.exe 23 8->18         started        20 powershell.exe 8->20         started        file6 signatures7 process8 signatures9 54 Loading BitLocker PowerShell Module 13->54 22 conhost.exe 13->22         started        24 conhost.exe 16->24         started        26 conhost.exe 18->26         started        28 conhost.exe 20->28         started        process10

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            03VPFXH490.exe79%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                            03VPFXH490.exe100%AviraTR/Spy.Gen
                            03VPFXH490.exe100%Joe Sandbox ML
                            SourceDetectionScannerLabelLink
                            C:\ProgramData\Java Update (32bit).exe100%AviraTR/Spy.Gen
                            C:\ProgramData\Java Update (32bit).exe100%Joe Sandbox ML
                            C:\ProgramData\Java Update (32bit).exe79%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            http://wwpkiops/Docs/Repository.htm00%Avira URL Cloudsafe
                            45.141.26.2340%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            ip-api.com
                            208.95.112.1
                            truefalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              45.141.26.234true
                              • Avira URL Cloud: safe
                              unknown
                              http://ip-api.com/line/?fields=hostingfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://wwpkiops/Docs/Repository.htm0powershell.exe, 00000004.00000002.1810793540.0000020C89955000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1775096450.0000023A10074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860716635.0000020C99A54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1981436782.0000019590074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000001.00000002.1761890443.0000023A00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C89C09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000001.00000002.1761890443.0000023A00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C89C09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 0000000B.00000002.2194033435.0000024B2E830000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1775096450.0000023A10074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860716635.0000020C99A54000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1981436782.0000019590074000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Licensepowershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/Iconpowershell.exe, 0000000B.00000002.2162812743.0000024B261A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://aka.ms/pscore68powershell.exe, 00000001.00000002.1761890443.0000023A00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C899E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16131000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name03VPFXH490.exe, 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1761890443.0000023A00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1811776017.0000020C899E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1906005748.0000019580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2054973292.0000024B16131000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://go.mpowershell.exe, 00000001.00000002.1782938063.0000023A760B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.2054973292.0000024B16358000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            208.95.112.1
                                                            ip-api.comUnited States
                                                            53334TUT-ASUSfalse
                                                            45.141.26.234
                                                            unknownNetherlands
                                                            62068SPECTRAIPSpectraIPBVNLtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1574851
                                                            Start date and time:2024-12-13 17:44:06 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 6m 7s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:14
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:03VPFXH490.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:f9a6811d7a9d5e06d73a68fc729ce66c.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@13/20@1/2
                                                            EGA Information:
                                                            • Successful, ratio: 20%
                                                            HCA Information:
                                                            • Successful, ratio: 100%
                                                            • Number of executed functions: 50
                                                            • Number of non-executed functions: 5
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                                            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target powershell.exe, PID 3940 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 7448 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 7684 because it is empty
                                                            • Execution Graph export aborted for target powershell.exe, PID 7956 because it is empty
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            • VT rate limit hit for: 03VPFXH490.exe
                                                            TimeTypeDescription
                                                            11:45:05API Interceptor48x Sleep call for process: powershell.exe modified
                                                            11:45:53API Interceptor517757x Sleep call for process: 03VPFXH490.exe modified
                                                            16:45:57AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update (32bit).lnk
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            208.95.112.1Chrome Browser Update.exeGet hashmaliciousPredatorBrowse
                                                            • ip-api.com/json/
                                                            boleto.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            taskhost.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            XClient.exeGet hashmaliciousXWormBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            jrockekcurje.exeGet hashmaliciousBlackshadesBrowse
                                                            • ip-api.com/json/
                                                            hbfgjhhesfd.exeGet hashmaliciousBlackshadesBrowse
                                                            • ip-api.com/json/
                                                            Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                            • ip-api.com/json
                                                            K98766700.exeGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            phost.exeGet hashmaliciousBlank GrabberBrowse
                                                            • ip-api.com/json/?fields=225545
                                                            sppawx.exeGet hashmaliciousBlank GrabberBrowse
                                                            • ip-api.com/json/?fields=225545
                                                            45.141.26.234_%e0%b8%b0%e0%b8%99%e0%b8%b2%e0%b8%b3%e0%b8%b7.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              ip-api.comChrome Browser Update.exeGet hashmaliciousPredatorBrowse
                                                              • 208.95.112.1
                                                              boleto.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              taskhost.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              XClient.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              jrockekcurje.exeGet hashmaliciousBlackshadesBrowse
                                                              • 208.95.112.1
                                                              hbfgjhhesfd.exeGet hashmaliciousBlackshadesBrowse
                                                              • 208.95.112.1
                                                              Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                              • 208.95.112.1
                                                              K98766700.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              phost.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 208.95.112.1
                                                              sppawx.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 208.95.112.1
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              SPECTRAIPSpectraIPBVNLsaiya.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                              • 45.141.26.134
                                                              windxcmd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                              • 45.141.26.134
                                                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                              • 45.138.53.54
                                                              18fvs4AVae.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                              • 45.141.26.170
                                                              Fulloption_V2.1.exeGet hashmaliciousXWormBrowse
                                                              • 45.141.27.248
                                                              BoostFPS.exeGet hashmaliciousXWormBrowse
                                                              • 45.141.27.248
                                                              bPRQRIfbbq.exeGet hashmaliciousUnknownBrowse
                                                              • 45.138.16.44
                                                              4Fm0sK0yKz.exeGet hashmaliciousAsyncRATBrowse
                                                              • 45.141.215.18
                                                              Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                              • 45.141.215.40
                                                              Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                              • 45.141.215.116
                                                              TUT-ASUSChrome Browser Update.exeGet hashmaliciousPredatorBrowse
                                                              • 208.95.112.1
                                                              boleto.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              taskhost.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              XClient.exeGet hashmaliciousXWormBrowse
                                                              • 208.95.112.1
                                                              jrockekcurje.exeGet hashmaliciousBlackshadesBrowse
                                                              • 208.95.112.1
                                                              hbfgjhhesfd.exeGet hashmaliciousBlackshadesBrowse
                                                              • 208.95.112.1
                                                              Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                              • 208.95.112.1
                                                              K98766700.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              phost.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 208.95.112.1
                                                              sppawx.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 208.95.112.1
                                                              No context
                                                              No context
                                                              Process:C:\Users\user\Desktop\03VPFXH490.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):41472
                                                              Entropy (8bit):5.587183654800141
                                                              Encrypted:false
                                                              SSDEEP:768:iZzGU8kyq5bzbTfFN8WuFZ4tJF5PC9O9dU68OMhE3/aZg:uzf95/b7r898Fc9UdU68OMSN
                                                              MD5:F9A6811D7A9D5E06D73A68FC729CE66C
                                                              SHA1:C882143D5FDE4B2E7EDB5A9ACCB534BA17D754EF
                                                              SHA-256:C583D0A367ECFFA74B82B78116BBB04B7C92BED0300ED1C3ADC4EF3250FBB9CC
                                                              SHA-512:4DEC52F0D1927306DEDA677FEA46D103B052AAA5F7D7F49ABE59A3618110EE542C2DB385158A393970751FCC9687EFE44A860D6330ED474C0C849369C0DA56DF
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\ProgramData\Java Update (32bit).exe, Author: Joe Security
                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\Java Update (32bit).exe, Author: Joe Security
                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\Java Update (32bit).exe, Author: Joe Security
                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\Java Update (32bit).exe, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 79%
                                                              Reputation:low
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...kL"g................................. ........@.. ....................................@.................................p...K.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......|]...Y............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:modified
                                                              Size (bytes):64
                                                              Entropy (8bit):0.34726597513537405
                                                              Encrypted:false
                                                              SSDEEP:3:Nlll:Nll
                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:@...e...........................................................
                                                              Process:C:\Users\user\Desktop\03VPFXH490.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):29
                                                              Entropy (8bit):3.598349098128234
                                                              Encrypted:false
                                                              SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                                                              MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                                                              SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                                                              SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                                                              SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                                                              Malicious:false
                                                              Preview:....### explorer ###..[WIN]r
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Users\user\Desktop\03VPFXH490.exe
                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 13 15:45:53 2024, mtime=Fri Dec 13 15:45:53 2024, atime=Fri Dec 13 15:45:53 2024, length=41472, window=hide
                                                              Category:dropped
                                                              Size (bytes):725
                                                              Entropy (8bit):4.639949674281885
                                                              Encrypted:false
                                                              SSDEEP:12:83HtCRcIz4Nke1olCjEjAjUilBdPb/xv5R5ZBmV:83HUWUAVBF5xfZBm
                                                              MD5:3DD20234A615F87DC946EF405CA5CA14
                                                              SHA1:B2A38636FDB8E6B51777C533B6DF1766019E065D
                                                              SHA-256:30C2CC28D874C17F1DDCF528C09B2AD1D02B393281FCA1A181F4C9A5AE620A3E
                                                              SHA-512:C7F94FF615633488E5869A35EE6DDDBCE9C735435CA7EAB97ED5199F233AC4648584127F5EEE3DE31222E5D652ED443ACF465FF72C29F973611D05DE64ADA942
                                                              Malicious:false
                                                              Preview:L..................F.... ....my~M....my~M....my~M...............................P.O. .:i.....+00.../C:\...................`.1......Y... PROGRA~3..H......O.I.Y......g.....................w5..P.r.o.g.r.a.m.D.a.t.a.....|.2......Y.. JAVAUP~1.EXE..`......Y...Y......&.....................H.<.J.a.v.a. .U.p.d.a.t.e. .(.3.2.b.i.t.)...e.x.e.......U...............-.......T...........x........C:\ProgramData\Java Update (32bit).exe..>.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m.D.a.t.a.\.J.a.v.a. .U.p.d.a.t.e. .(.3.2.b.i.t.)...e.x.e.`.......X.......855271...........hT..CrF.f4... ....q....,.......hT..CrF.f4... ....q....,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):5.587183654800141
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              File name:03VPFXH490.exe
                                                              File size:41'472 bytes
                                                              MD5:f9a6811d7a9d5e06d73a68fc729ce66c
                                                              SHA1:c882143d5fde4b2e7edb5a9accb534ba17d754ef
                                                              SHA256:c583d0a367ecffa74b82b78116bbb04b7c92bed0300ed1c3adc4ef3250fbb9cc
                                                              SHA512:4dec52f0d1927306deda677fea46d103b052aaa5f7d7f49abe59a3618110ee542c2db385158a393970751fcc9687efe44a860d6330ed474c0c849369c0da56df
                                                              SSDEEP:768:iZzGU8kyq5bzbTfFN8WuFZ4tJF5PC9O9dU68OMhE3/aZg:uzf95/b7r898Fc9UdU68OMSN
                                                              TLSH:1A135B4477D44626E5FEABF929B3A6030770E6034913DB5E0CD8869B2B37BC48B117D6
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...kL"g................................. ........@.. ....................................@................................
                                                              Icon Hash:90cececece8e8eb0
                                                              Entrypoint:0x40b7be
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x67224C6B [Wed Oct 30 15:10:35 2024 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb7700x4b.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4c0.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000x97c40x9800d252ebc7d6d896c83382a89f7593b56cFalse0.4929327713815789data5.707890843476401IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xc0000x4c00x600e273c8a0d52f54a66fe6cb494c8d9bcbFalse0.37109375data3.675191781514014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xe0000xc0x20057d018d321f2cb5a5b79ad9364b592feFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_VERSION0xc0a00x22cdata0.4766187050359712
                                                              RT_MANIFEST0xc2d00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-12-13T17:45:56.562516+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:00.823486+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:00.823486+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:01.474616+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:06.474257+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:07.663515+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:46:08.743008+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:08.774353+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:46:11.491415+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:16.516874+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:21.547241+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:21.548935+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:46:21.952041+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:26.671858+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:30.889531+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:30.889531+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:31.532464+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:34.549061+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:34.550780+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:46:36.529959+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:41.532108+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:46.538787+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:49.102934+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:51.543235+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:46:56.556107+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:00.606699+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:00.608558+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:47:00.912470+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:00.912470+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:01.565888+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:06.575947+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:10.734326+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              2024-12-13T17:47:10.735067+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44973745.141.26.2347000TCP
                                                              2024-12-13T17:47:11.583663+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.26.2347000192.168.2.449737TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 13, 2024 17:45:02.861910105 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:45:02.982157946 CET8049730208.95.112.1192.168.2.4
                                                              Dec 13, 2024 17:45:02.982388020 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:45:02.983549118 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:45:03.103815079 CET8049730208.95.112.1192.168.2.4
                                                              Dec 13, 2024 17:45:04.237852097 CET8049730208.95.112.1192.168.2.4
                                                              Dec 13, 2024 17:45:04.285733938 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:45:54.398945093 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:45:54.519217014 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:54.519323111 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:45:54.571578979 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:45:54.692105055 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.562515974 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.613770962 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:45:56.656049967 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:45:56.776016951 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776093006 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776123047 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776395082 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776423931 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776456118 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:45:56.776503086 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:00.823486090 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:00.879389048 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:01.474616051 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.519995928 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:01.525269032 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:01.653304100 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.653341055 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.653367996 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.662779093 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.662930012 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.662957907 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:01.727467060 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.474256992 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.520013094 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:06.529057980 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:06.649169922 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649211884 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649269104 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649296999 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649327040 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649370909 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:06.649398088 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:07.186446905 CET8049730208.95.112.1192.168.2.4
                                                              Dec 13, 2024 17:46:07.186661005 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:46:07.663515091 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:07.785363913 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:08.743007898 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:08.774353027 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:08.894345045 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.491415024 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.542471886 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:11.679651022 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:11.804112911 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804162979 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804191113 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804223061 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804249048 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804276943 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804305077 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:11.804335117 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.516874075 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.562127113 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:16.685142994 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685184956 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685215950 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685225964 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685436010 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685519934 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685530901 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:16.685540915 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:20.755057096 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:20.876276970 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:21.547240973 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:21.548934937 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:21.668780088 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:21.952040911 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:21.995397091 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:22.115590096 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115634918 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115689993 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115719080 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115748882 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115860939 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115894079 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:22.115926981 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.671858072 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.722189903 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:26.900233030 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900252104 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900264025 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900274992 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900285959 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900298119 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900309086 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:26.900321007 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:30.889530897 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:30.941951036 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:31.532464027 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.582568884 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:31.597974062 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:31.718213081 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718393087 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718452930 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718556881 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718617916 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718631983 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718713999 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:31.718732119 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:33.848681927 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:33.968476057 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:34.549061060 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:34.550780058 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:34.674098969 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.529958963 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.560206890 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:36.680332899 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680351973 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680411100 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680423975 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680485010 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680572033 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680763006 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:36.680775881 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.532108068 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.578958035 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:41.698899984 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699024916 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699080944 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699160099 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699208975 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699218988 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699263096 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:41.699317932 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:44.255682945 CET4973080192.168.2.4208.95.112.1
                                                              Dec 13, 2024 17:46:44.377290964 CET8049730208.95.112.1192.168.2.4
                                                              Dec 13, 2024 17:46:46.538786888 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.574510098 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:46.694473028 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694483995 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694613934 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694622993 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694725990 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694734097 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694845915 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.694854021 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:46.942400932 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:47.069042921 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:49.102933884 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:49.104825020 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:49.225116968 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.543235064 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.573209047 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:51.693938971 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.693953991 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.693974972 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.693988085 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.694000006 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.694015026 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.694026947 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:51.694048882 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.556107044 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.598248005 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:56.613318920 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:46:56.733493090 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733511925 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733535051 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733556986 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733571053 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733582973 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733607054 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:46:56.733620882 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:00.036222935 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:00.157912016 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:00.606698990 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:00.608557940 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:00.728514910 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:00.912470102 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:00.957612991 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:01.565887928 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.615662098 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:01.623670101 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:01.743710041 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.743736029 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.743823051 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.743885040 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.744083881 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.744131088 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.744246006 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:01.744267941 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:06.575947046 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:06.629517078 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:10.161292076 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:10.214250088 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:10.285505056 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.338706970 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.338785887 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.338915110 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.338943005 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.338994026 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.339020967 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.339054108 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.339102983 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.734325886 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:10.735066891 CET497377000192.168.2.445.141.26.234
                                                              Dec 13, 2024 17:47:10.855590105 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:11.583662987 CET70004973745.141.26.234192.168.2.4
                                                              Dec 13, 2024 17:47:11.629503965 CET497377000192.168.2.445.141.26.234
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 13, 2024 17:45:02.709244013 CET4931553192.168.2.41.1.1.1
                                                              Dec 13, 2024 17:45:02.854425907 CET53493151.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Dec 13, 2024 17:45:02.709244013 CET192.168.2.41.1.1.10x33d0Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Dec 13, 2024 17:45:02.854425907 CET1.1.1.1192.168.2.40x33d0No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                              • ip-api.com
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449730208.95.112.1807316C:\Users\user\Desktop\03VPFXH490.exe
                                                              TimestampBytes transferredDirectionData
                                                              Dec 13, 2024 17:45:02.983549118 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                              Host: ip-api.com
                                                              Connection: Keep-Alive
                                                              Dec 13, 2024 17:45:04.237852097 CET175INHTTP/1.1 200 OK
                                                              Date: Fri, 13 Dec 2024 16:45:03 GMT
                                                              Content-Type: text/plain; charset=utf-8
                                                              Content-Length: 6
                                                              Access-Control-Allow-Origin: *
                                                              X-Ttl: 60
                                                              X-Rl: 44
                                                              Data Raw: 66 61 6c 73 65 0a
                                                              Data Ascii: false


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:11:44:58
                                                              Start date:13/12/2024
                                                              Path:C:\Users\user\Desktop\03VPFXH490.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\Desktop\03VPFXH490.exe"
                                                              Imagebase:0xa50000
                                                              File size:41'472 bytes
                                                              MD5 hash:F9A6811D7A9D5E06D73A68FC729CE66C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1675093210.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2941379266.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2941379266.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:1
                                                              Start time:11:45:03
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\03VPFXH490.exe'
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:11:45:03
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:11:45:09
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '03VPFXH490.exe'
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:11:45:09
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:11:45:19
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:11:45:19
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:11:45:34
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe'
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:11:45:34
                                                              Start date:13/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:23.1%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:20%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:0
                                                                execution_graph 4984 7ffd9bad83b5 4986 7ffd9bad83bf SetWindowsHookExW 4984->4986 4987 7ffd9bad9031 4986->4987 4980 7ffd9bad6e61 4981 7ffd9bad6e7f CheckRemoteDebuggerPresent 4980->4981 4983 7ffd9bad6f1f 4981->4983 4968 7ffd9bad8a0d 4969 7ffd9bad8a70 RtlSetProcessIsCritical 4968->4969 4971 7ffd9bad8af2 4969->4971 4972 7ffd9bad8dad 4973 7ffd9bad8dbf 4972->4973 4976 7ffd9bad83c0 4973->4976 4975 7ffd9bad8dfb 4977 7ffd9bad83c9 SetWindowsHookExW 4976->4977 4979 7ffd9bad9031 4977->4979 4979->4975

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 7ffd9bad0610-7ffd9bad0cdf 8 7ffd9bad0ce8-7ffd9bad0cec 0->8 9 7ffd9bad0ce1-7ffd9bad0ce6 0->9 10 7ffd9bad0cef-7ffd9bad0d09 8->10 9->10 12 7ffd9bad0d0b-7ffd9bad0d3d 10->12 13 7ffd9bad0d43-7ffd9bad0d89 10->13 20 7ffd9bad0d8a-7ffd9bad0dd0 12->20 21 7ffd9bad0d3f-7ffd9bad0d41 12->21 26 7ffd9bad140a-7ffd9bad1451 20->26 27 7ffd9bad0dd6-7ffd9bad0f05 call 7ffd9bad0538 * 8 call 7ffd9bad0648 20->27 21->12 21->13 68 7ffd9bad0f07-7ffd9bad0f0e 27->68 69 7ffd9bad0f0f-7ffd9bad0f77 call 7ffd9bad04b8 call 7ffd9bad04b0 call 7ffd9bad0358 call 7ffd9bad0368 27->69 68->69 83 7ffd9bad0f78-7ffd9bad0f86 69->83 85 7ffd9bad0f99-7ffd9bad0fa9 83->85 86 7ffd9bad0f88-7ffd9bad0f92 83->86 89 7ffd9bad0fab-7ffd9bad0fb6 85->89 90 7ffd9bad0fd1-7ffd9bad0ff1 85->90 86->85 89->83 92 7ffd9bad0fb8-7ffd9bad0fca call 7ffd9bad0358 89->92 97 7ffd9bad1002-7ffd9bad10e4 90->97 98 7ffd9bad0ff3-7ffd9bad0ffd call 7ffd9bad0378 90->98 92->90 112 7ffd9bad10e6-7ffd9bad10fb 97->112 113 7ffd9bad1132-7ffd9bad1165 97->113 98->97 112->113 120 7ffd9bad118a-7ffd9bad11ba 113->120 121 7ffd9bad1167-7ffd9bad1188 113->121 123 7ffd9bad11c2-7ffd9bad11f9 120->123 121->123 128 7ffd9bad11fb-7ffd9bad121c 123->128 129 7ffd9bad121e-7ffd9bad124e 123->129 130 7ffd9bad1256-7ffd9bad1338 call 7ffd9bad0388 call 7ffd9bad05e8 call 7ffd9bad0788 128->130 129->130 149 7ffd9bad133a call 7ffd9bad0828 130->149 150 7ffd9bad133f-7ffd9bad134a 130->150 149->150 153 7ffd9bad134c-7ffd9bad1356 150->153 154 7ffd9bad135d-7ffd9bad13ea 150->154 153->154 164 7ffd9bad13f1-7ffd9bad1409 154->164
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: CAL_^
                                                                • API String ID: 0-3140518731
                                                                • Opcode ID: 1db74a51ec65c1ee742836f50f499ae3949341a6a264e1592e16540c21d6c89c
                                                                • Instruction ID: 6e7f34d79564c40ee3d1ad4172b1ec2070a673b369f666fe9fbc64a5bfe5cd08
                                                                • Opcode Fuzzy Hash: 1db74a51ec65c1ee742836f50f499ae3949341a6a264e1592e16540c21d6c89c
                                                                • Instruction Fuzzy Hash: A5323421B19A490FE7A8FB7888796B977D2FFD8314F40467DE04EC32D6DE28A8418741

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 216 7ffd9bad6e61-7ffd9bad6f1d CheckRemoteDebuggerPresent 220 7ffd9bad6f25-7ffd9bad6f68 216->220 221 7ffd9bad6f1f 216->221 221->220
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID: CheckDebuggerPresentRemote
                                                                • String ID:
                                                                • API String ID: 3662101638-0
                                                                • Opcode ID: 4739d77076279e19567c2ecf0307a9938b1576a2cc15e434b2e751bf217797c6
                                                                • Instruction ID: 5b9bcbc3e08d48333de66041c7bfaf64b6f8df1787409344ba0dca63e49d9c68
                                                                • Opcode Fuzzy Hash: 4739d77076279e19567c2ecf0307a9938b1576a2cc15e434b2e751bf217797c6
                                                                • Instruction Fuzzy Hash: FE31113190875C8FCB58DF58C84A7E97BE0EF69321F0542ABD489D7292DB34A806CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 395 7ffd9bad9420-7ffd9badc613 397 7ffd9badc615-7ffd9badc620 call 7ffd9bad0640 395->397 398 7ffd9badc65d-7ffd9badc670 395->398 402 7ffd9badc625-7ffd9badc65a 397->402 399 7ffd9badc6e6 398->399 400 7ffd9badc672-7ffd9badc68f 398->400 403 7ffd9badc6eb-7ffd9badc700 399->403 400->403 405 7ffd9badc691-7ffd9badc6e1 call 7ffd9badb4e0 400->405 402->398 409 7ffd9badc702-7ffd9badc719 call 7ffd9bad0830 call 7ffd9bad0650 403->409 410 7ffd9badc71e-7ffd9badc733 403->410 430 7ffd9badd2c8-7ffd9badd2d6 405->430 409->430 417 7ffd9badc76a-7ffd9badc77f 410->417 418 7ffd9badc735-7ffd9badc765 call 7ffd9bad0830 410->418 428 7ffd9badc792-7ffd9badc7a7 417->428 429 7ffd9badc781-7ffd9badc78d call 7ffd9badab68 417->429 418->430 436 7ffd9badc7a9-7ffd9badc7ac 428->436 437 7ffd9badc7ed-7ffd9badc802 428->437 429->430 436->399 439 7ffd9badc7b2-7ffd9badc7bd 436->439 443 7ffd9badc804-7ffd9badc807 437->443 444 7ffd9badc843-7ffd9badc858 437->444 439->399 440 7ffd9badc7c3-7ffd9badc7e8 call 7ffd9bad0628 call 7ffd9badab68 439->440 440->430 443->399 445 7ffd9badc80d-7ffd9badc818 443->445 451 7ffd9badc85a-7ffd9badc85d 444->451 452 7ffd9badc885-7ffd9badc89a 444->452 445->399 447 7ffd9badc81e-7ffd9badc83e call 7ffd9bad0628 call 7ffd9bad9470 445->447 447->430 451->399 455 7ffd9badc863-7ffd9badc880 call 7ffd9bad0628 call 7ffd9bad9478 451->455 460 7ffd9badc972-7ffd9badc987 452->460 461 7ffd9badc8a0-7ffd9badc8ec call 7ffd9bad05b0 452->461 455->430 470 7ffd9badc989-7ffd9badc98c 460->470 471 7ffd9badc9a6-7ffd9badc9bb 460->471 461->399 495 7ffd9badc8f2-7ffd9badc92a call 7ffd9bad2490 461->495 470->399 473 7ffd9badc992-7ffd9badc9a1 call 7ffd9bad9450 470->473 479 7ffd9badc9dd-7ffd9badc9f2 471->479 480 7ffd9badc9bd-7ffd9badc9c0 471->480 473->430 486 7ffd9badca12-7ffd9badca27 479->486 487 7ffd9badc9f4-7ffd9badca0d 479->487 480->399 481 7ffd9badc9c6-7ffd9badc9d8 call 7ffd9bad9450 480->481 481->430 493 7ffd9badca29-7ffd9badca42 486->493 494 7ffd9badca47-7ffd9badca5c 486->494 487->430 493->430 498 7ffd9badca7c-7ffd9badca91 494->498 499 7ffd9badca5e-7ffd9badca77 494->499 495->399 512 7ffd9badc930-7ffd9badc96d call 7ffd9badab78 495->512 504 7ffd9badcaba-7ffd9badcacf 498->504 505 7ffd9badca93-7ffd9badca96 498->505 499->430 513 7ffd9badcad5-7ffd9badcb4d 504->513 514 7ffd9badcb6f-7ffd9badcb84 504->514 505->399 507 7ffd9badca9c-7ffd9badcab5 505->507 507->430 512->430 513->399 542 7ffd9badcb53-7ffd9badcb6a 513->542 519 7ffd9badcb9c-7ffd9badcbb1 514->519 520 7ffd9badcb86-7ffd9badcb97 514->520 528 7ffd9badcbb7-7ffd9badcc2f 519->528 529 7ffd9badcc51-7ffd9badcc66 519->529 520->430 528->399 558 7ffd9badcc35-7ffd9badcc4c 528->558 535 7ffd9badcc68-7ffd9badcc79 529->535 536 7ffd9badcc7e-7ffd9badcc93 529->536 535->430 544 7ffd9badcc95-7ffd9badcccf call 7ffd9bad0af0 call 7ffd9badb4e0 536->544 545 7ffd9badccd4-7ffd9badcce9 536->545 542->430 544->430 551 7ffd9badcd90-7ffd9badcda5 545->551 552 7ffd9badccef-7ffd9badcd8b call 7ffd9bad0af0 call 7ffd9badb4e0 545->552 560 7ffd9badcdab-7ffd9badcdae 551->560 561 7ffd9badce33-7ffd9badce48 551->561 552->430 558->430 563 7ffd9badce28-7ffd9badce2d 560->563 564 7ffd9badcdb0-7ffd9badcdbb 560->564 569 7ffd9badce4a-7ffd9badce57 call 7ffd9badb4e0 561->569 570 7ffd9badce5c-7ffd9badce71 561->570 578 7ffd9badce2e 563->578 564->563 568 7ffd9badcdbd-7ffd9badce26 call 7ffd9bad0af0 call 7ffd9badb4e0 564->568 568->578 569->430 582 7ffd9badceb2-7ffd9badcec7 570->582 583 7ffd9badce73-7ffd9badcead call 7ffd9bad0af0 call 7ffd9badb4e0 570->583 578->430 590 7ffd9badcf52-7ffd9badcf67 582->590 591 7ffd9badcecd-7ffd9badcede 582->591 583->430 602 7ffd9badcf69-7ffd9badcf6c 590->602 603 7ffd9badcfa7-7ffd9badcfbc 590->603 591->399 600 7ffd9badcee4-7ffd9badcef4 call 7ffd9bad0620 591->600 613 7ffd9badcef6-7ffd9badcf2b call 7ffd9badb4e0 600->613 614 7ffd9badcf30-7ffd9badcf4d call 7ffd9bad0620 call 7ffd9bad0628 call 7ffd9bad9428 600->614 602->399 604 7ffd9badcf72-7ffd9badcfa2 call 7ffd9bad0618 call 7ffd9bad0628 call 7ffd9bad9428 602->604 615 7ffd9badd002-7ffd9badd017 603->615 616 7ffd9badcfbe-7ffd9badcffd call 7ffd9badb1a0 call 7ffd9badba00 call 7ffd9bad9430 603->616 604->430 613->430 614->430 632 7ffd9badd019-7ffd9badd07c call 7ffd9bad0af0 call 7ffd9badb4e0 615->632 633 7ffd9badd081-7ffd9badd096 615->633 616->430 632->430 633->430 652 7ffd9badd09c-7ffd9badd0a3 633->652 656 7ffd9badd0b6 652->656 657 7ffd9badd0a5-7ffd9badd0af call 7ffd9badab88 652->657 661 7ffd9badd0bb-7ffd9badd0df 656->661 657->656 661->430
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ddca627165bf03b814351387d86fdc7473d5ae3b58aafbc4905cb98815c122e6
                                                                • Instruction ID: 7637bade9336d964ae07915baaca5a772608dd08b01aafdaa92ff2e9644e79b3
                                                                • Opcode Fuzzy Hash: ddca627165bf03b814351387d86fdc7473d5ae3b58aafbc4905cb98815c122e6
                                                                • Instruction Fuzzy Hash: 75625D34B1D90D4BEBA8FB788469A7D63D2EFD8310B914679D41EC32D6DE68EC428740
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d29d71242f5be3b619d286ea7cd6ff381ae817a6d208de927e66e528bdd72d57
                                                                • Instruction ID: 6ebc9818250a0ba3759be919f5b3f7c211b12359038b8a3440b17f19f8400da8
                                                                • Opcode Fuzzy Hash: d29d71242f5be3b619d286ea7cd6ff381ae817a6d208de927e66e528bdd72d57
                                                                • Instruction Fuzzy Hash: CDF19630A09A8D8FEBA8DF28CC557E937D1FF95310F04426EE84DC72A5DB74A9458B81
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 68e054403acf774a22bdfa307ac966f86535c278081413393439deaa4edb7824
                                                                • Instruction ID: ff7e4a74e13d1b82e90b4cc76670a16795adfad70c10ec448a1bc5d223e5f83d
                                                                • Opcode Fuzzy Hash: 68e054403acf774a22bdfa307ac966f86535c278081413393439deaa4edb7824
                                                                • Instruction Fuzzy Hash: 79E1A530A09A4D8FEBA8DF68C8657E977D1FF94310F04436EE84DC72A5DE74A9448B81
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 74df891c8b5607f6a24c779f603fda78229927d8da15440c73c4fb440dffb10c
                                                                • Instruction ID: 3218a39f803588f573035a911412d2091e8e92a0e32629c1d2eff392ca95c348
                                                                • Opcode Fuzzy Hash: 74df891c8b5607f6a24c779f603fda78229927d8da15440c73c4fb440dffb10c
                                                                • Instruction Fuzzy Hash: 2DC1E620B1D94D4FEBA8E778847967D77D2EFE9301F054279E04EC32E2DE68A9028741

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 166 7ffd9bad8a0d-7ffd9bad8af0 RtlSetProcessIsCritical 169 7ffd9bad8af8-7ffd9bad8b2d 166->169 170 7ffd9bad8af2 166->170 170->169
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID: CriticalProcess
                                                                • String ID:
                                                                • API String ID: 2695349919-0
                                                                • Opcode ID: de9310b6029caddaac4316b7e59e1caf203d592065738c465a45735d84902973
                                                                • Instruction ID: 8d5fd66a79c5a12f0862893288a01b08d7ba9f545853f2f42f47b92514e7fab8
                                                                • Opcode Fuzzy Hash: de9310b6029caddaac4316b7e59e1caf203d592065738c465a45735d84902973
                                                                • Instruction Fuzzy Hash: 3341053190C6488FDB18DF98C849BE9BBF0FF56311F04426EE09AD3592CB746846CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 172 7ffd9bad83b5-7ffd9bad8fdd 178 7ffd9bad9069-7ffd9bad906d 172->178 179 7ffd9bad8fe3-7ffd9bad8ff0 172->179 180 7ffd9bad8ff2-7ffd9bad902f SetWindowsHookExW 178->180 179->180 182 7ffd9bad9037-7ffd9bad9068 180->182 183 7ffd9bad9031 180->183 183->182
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID: HookWindows
                                                                • String ID:
                                                                • API String ID: 2559412058-0
                                                                • Opcode ID: e566d3f0bc9b56bbc1a3e56b1249e0246ce25ebe45ea51e7b397c12a54a83797
                                                                • Instruction ID: 3c418ecc639f5f34b21e8ee4ebba134f748944c7d798575afb0db6b2f954731e
                                                                • Opcode Fuzzy Hash: e566d3f0bc9b56bbc1a3e56b1249e0246ce25ebe45ea51e7b397c12a54a83797
                                                                • Instruction Fuzzy Hash: 1A410B71A0DA5C4FDB28DF6CD8156B97BE1EFA9325F00427FD05DC3292CA64A84687C1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 187 7ffd9bad8f58-7ffd9bad8f5f 188 7ffd9bad8f6a-7ffd9bad8fdd 187->188 189 7ffd9bad8f61-7ffd9bad8f69 187->189 193 7ffd9bad9069-7ffd9bad906d 188->193 194 7ffd9bad8fe3-7ffd9bad8ff0 188->194 189->188 195 7ffd9bad8ff2-7ffd9bad902f SetWindowsHookExW 193->195 194->195 197 7ffd9bad9037-7ffd9bad9068 195->197 198 7ffd9bad9031 195->198 198->197
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID: HookWindows
                                                                • String ID:
                                                                • API String ID: 2559412058-0
                                                                • Opcode ID: 8d0fc7ae2d7abf559372b483f3183a64e9691a5a7c148b1cde59641e9dac2956
                                                                • Instruction ID: 3d1d2ef250e9eb46e8f5dadb166377bfea51b1064a5d4a568d4c0e74edad3d03
                                                                • Opcode Fuzzy Hash: 8d0fc7ae2d7abf559372b483f3183a64e9691a5a7c148b1cde59641e9dac2956
                                                                • Instruction Fuzzy Hash: F6310B31A1CA5D4FDB18DB6C981A6F97BE1EF99325F00027ED05DC3292CE64A81687C1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 202 7ffd9bad83c0-7ffd9bad8fdd 207 7ffd9bad9069-7ffd9bad906d 202->207 208 7ffd9bad8fe3-7ffd9bad8ff0 202->208 209 7ffd9bad8ff2-7ffd9bad902f SetWindowsHookExW 207->209 208->209 211 7ffd9bad9037-7ffd9bad9068 209->211 212 7ffd9bad9031 209->212 212->211
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2987103485.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7ffd9bad0000_03VPFXH490.jbxd
                                                                Similarity
                                                                • API ID: HookWindows
                                                                • String ID:
                                                                • API String ID: 2559412058-0
                                                                • Opcode ID: 09ec0d54e0b217c5cdf32b5cf4ef08d21d1742404bab8fa7fa882a2295986b4d
                                                                • Instruction ID: c82a2aa85767f339cc7c4c7f543f4608ad563111e0d931d51e41189ef5eab6cd
                                                                • Opcode Fuzzy Hash: 09ec0d54e0b217c5cdf32b5cf4ef08d21d1742404bab8fa7fa882a2295986b4d
                                                                • Instruction Fuzzy Hash: A4311A31A1CA4C4FDB18EF6CD8156B977E1EF99325F00427ED05DC3296CA70A80687C1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c951b9fb419f00ef265b906002db899a664142e9501cda7faf86e9e74b60601d
                                                                • Instruction ID: d14b059af8bf2b5287d345dd608c911a33672894a8d1bf70ebe6a5339a5769a7
                                                                • Opcode Fuzzy Hash: c951b9fb419f00ef265b906002db899a664142e9501cda7faf86e9e74b60601d
                                                                • Instruction Fuzzy Hash: 97D19231A08A5D8FDF98DF5CC464AADBBE1FF68310F15426AD41DD7296CA74E881CB80
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1786254814.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7c52738f46624ffb18275c23bc8f823ffcb708269d799e6f9734efafea2e01d6
                                                                • Instruction ID: e29a57c057c3934c80b7233e5fcbbd9fe3aab6af539483885ad562f4cd619e68
                                                                • Opcode Fuzzy Hash: 7c52738f46624ffb18275c23bc8f823ffcb708269d799e6f9734efafea2e01d6
                                                                • Instruction Fuzzy Hash: B8D12421B0EACE0FEBA5AB6858655B57B91FF16318F0901BFD49EC70E3D928A905C341
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8654b214881c40ccc5c65bc5133354e74050f6020f631a9153105d44c42dcf3a
                                                                • Instruction ID: c9c6235bee29549b8fad13729fb067fa74284c916350c8d97bf9838d225ac7ae
                                                                • Opcode Fuzzy Hash: 8654b214881c40ccc5c65bc5133354e74050f6020f631a9153105d44c42dcf3a
                                                                • Instruction Fuzzy Hash: BE412A71A1DA8C8FDB589F5C981A6F8BBE0FB94310F10812FE058C3252DA60B955CBC2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1784816635.00007FFD9B99D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B99D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9b99d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4be5ca351c44e622fcd9e43a3d3e7cf955f59d941f3927cb99f7b1171c50117e
                                                                • Instruction ID: c2a6d7d2366ffa705264a33385e7b274d6140bec677150679313bd32cbe5490e
                                                                • Opcode Fuzzy Hash: 4be5ca351c44e622fcd9e43a3d3e7cf955f59d941f3927cb99f7b1171c50117e
                                                                • Instruction Fuzzy Hash: 0A41277150EFC85FE756CB28D8519523FF0EF52310B1505EFD088CB1A3D625A80AC792
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a1571319dc1d6d474b673230493316fde40d3a7994a754a37980872d67d1f362
                                                                • Instruction ID: 3b4ca5c64498dce4fe619b2d140ce3871668b2c0d2fe224d295f3ea86997f153
                                                                • Opcode Fuzzy Hash: a1571319dc1d6d474b673230493316fde40d3a7994a754a37980872d67d1f362
                                                                • Instruction Fuzzy Hash: 9D212B3090C74C4FDB59DBAC984A7E97FF0EB56321F04426FD058C7152DA749415CB91
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4ee5bb6c5713c8207640c09ba03e0f54031b38f532e2f4706e46b9a0cb4171a0
                                                                • Instruction ID: b0188276e983bb649b220287ebd683664020351d70bf08cb267b405a6ec6ff89
                                                                • Opcode Fuzzy Hash: 4ee5bb6c5713c8207640c09ba03e0f54031b38f532e2f4706e46b9a0cb4171a0
                                                                • Instruction Fuzzy Hash: 4921F622A0E6DB1ADB12AB6C98714E53F50DF1222EF4942F7E8AD8F0E3ED152405C752
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction ID: 17cf545b06c68c12749fae18c059a1fd3c0929f1bc305d672c46b898a287b68f
                                                                • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction Fuzzy Hash: 8301A73120CB0C4FD748EF0CE051AA6B3E0FF85320F10056EE58AC36A1DA32E882CB45
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1786254814.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction ID: 2b7d983186ac8b342ef143f7b20347533711948212db3ddb9e9f3eee0f7c0e5b
                                                                • Opcode Fuzzy Hash: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction Fuzzy Hash: BCF09032B0D9094FD769EA4CE45189477E0FF55324B1200BAE15DC71B3CA35EC408740
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1786254814.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction ID: f8e1fd036749847bda479d52db41c666d8f44e540076f2dd177018c485acfb5b
                                                                • Opcode Fuzzy Hash: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction Fuzzy Hash: 4FF0BE32A0E9498FD7A8EA4CE0618A873E0FF05328B1600BAE15DC70A3CA25AC40C740
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1786254814.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction ID: 2dff48247507cb871ad432cab4ca7b8e5aeb9198aba82777103ccfbb354ce81a
                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction Fuzzy Hash: 6CE01A31B0C8088FDAB9EA4CE0519A977E1FB98325B1201BBD14EC75B1CA32ED518B80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1785488266.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: M_^4$M_^7$M_^F$M_^J
                                                                • API String ID: 0-622050427
                                                                • Opcode ID: 080c982ac5c94dabc77c050bd4f89e970741ddc133ea21d5bcda1e5c047230bc
                                                                • Instruction ID: 62e749294f243f73b03f876d386388aef594bfc7f5e75aab27cdd844d1464f7b
                                                                • Opcode Fuzzy Hash: 080c982ac5c94dabc77c050bd4f89e970741ddc133ea21d5bcda1e5c047230bc
                                                                • Instruction Fuzzy Hash: 7121C5A77085659ED316BB7DAC149E93740CFA827A78507F3E1A9CF093F9146086CAD0
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878912012.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d40327cf8c2a7fc64cf6c055dde5abcc86be13c572dd944f1671b698280dcaf8
                                                                • Instruction ID: 8f8a73dcbf79cd11846ea8b1004fe7919cac86e00ba77d20a02cdcbcb1fccda3
                                                                • Opcode Fuzzy Hash: d40327cf8c2a7fc64cf6c055dde5abcc86be13c572dd944f1671b698280dcaf8
                                                                • Instruction Fuzzy Hash: 3FD13631B0EA8E0FEBA59B6858655B57B90FF16318F0901BFD45EC71E3DA28A905C341
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 09901dcc2e4adbf72adb646f83273be74434236c4d648616ff948f676ad26f9b
                                                                • Instruction ID: 585af95bd724a19b0b774d4722f9a6f7bbf28dd9cb1cf4a3202bcfe200abde22
                                                                • Opcode Fuzzy Hash: 09901dcc2e4adbf72adb646f83273be74434236c4d648616ff948f676ad26f9b
                                                                • Instruction Fuzzy Hash: E1412A71A0DBC84FD719DB6C9C1A6B9BFE0EB55310F0441AFD09883293DA64B955CBC2
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1877729463.00007FFD9B99D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B99D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9b99d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1e728726e58e33294fa67e3a0cea8787a7a109abd1dac2e5cc0a92f2cfdaa6bb
                                                                • Instruction ID: 5d0548e46a9b506c1bd900790c1f1478e9ab5db0b684601bb28e85918457a4e2
                                                                • Opcode Fuzzy Hash: 1e728726e58e33294fa67e3a0cea8787a7a109abd1dac2e5cc0a92f2cfdaa6bb
                                                                • Instruction Fuzzy Hash: D341287180EFC45FE7969B3998519523FF0EF53320B1605EFD088CB1A3D625A84AC7A2
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc89bbc0997eecdb67615830f77b098c97eb30ac00958e02d30b6819ebda8b43
                                                                • Instruction ID: f65a42eadb978fa0401effc653f4df291b684017bbe0c748dad84ed587a10a1e
                                                                • Opcode Fuzzy Hash: cc89bbc0997eecdb67615830f77b098c97eb30ac00958e02d30b6819ebda8b43
                                                                • Instruction Fuzzy Hash: A921F63090CB4C4FDB59DBACD84ABE97BE0EB56321F04426FD44DC7162DA74A416CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction ID: 17cf545b06c68c12749fae18c059a1fd3c0929f1bc305d672c46b898a287b68f
                                                                • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction Fuzzy Hash: 8301A73120CB0C4FD748EF0CE051AA6B3E0FF85320F10056EE58AC36A1DA32E882CB45
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cf14774d37f7a2e19faf78c62af4df176e93dd1f9950ada18dba4e8c0e255430
                                                                • Instruction ID: c616dab34118bcbbe5ab878098e921facf1ab4e632e90662459c6e4a42de9f99
                                                                • Opcode Fuzzy Hash: cf14774d37f7a2e19faf78c62af4df176e93dd1f9950ada18dba4e8c0e255430
                                                                • Instruction Fuzzy Hash: 5E01B53190D3DA4FCB16EF3894654E43FA0DF16119B4942FBE8AD8F0A3DA246408C7A1
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878912012.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction ID: 2b7d983186ac8b342ef143f7b20347533711948212db3ddb9e9f3eee0f7c0e5b
                                                                • Opcode Fuzzy Hash: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction Fuzzy Hash: BCF09032B0D9094FD769EA4CE45189477E0FF55324B1200BAE15DC71B3CA35EC408740
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878912012.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction ID: f8e1fd036749847bda479d52db41c666d8f44e540076f2dd177018c485acfb5b
                                                                • Opcode Fuzzy Hash: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction Fuzzy Hash: 4FF0BE32A0E9498FD7A8EA4CE0618A873E0FF05328B1600BAE15DC70A3CA25AC40C740
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878912012.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction ID: 2dff48247507cb871ad432cab4ca7b8e5aeb9198aba82777103ccfbb354ce81a
                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction Fuzzy Hash: 6CE01A31B0C8088FDAB9EA4CE0519A977E1FB98325B1201BBD14EC75B1CA32ED518B80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: M_^8$M_^<$M_^?$M_^J$M_^K$M_^N$M_^Q$M_^Y
                                                                • API String ID: 0-962139525
                                                                • Opcode ID: 32ba26589fa0e7a62dd8a312b3dc4cc8d233eb561294beb8cf2edc3a6d3793b8
                                                                • Instruction ID: 66d0e04f0872e0335e4fe59ef7b4c469ceb008a922e36b624b51b9563710bd55
                                                                • Opcode Fuzzy Hash: 32ba26589fa0e7a62dd8a312b3dc4cc8d233eb561294beb8cf2edc3a6d3793b8
                                                                • Instruction Fuzzy Hash: 9021C5737045258AD315766CBC519D87780DF6837E38603F3F429CF193E91864878A81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.1878337739.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: M_^$M_^$M_^$M_^$M_^
                                                                • API String ID: 0-679677686
                                                                • Opcode ID: 6a43399540d15f33040c7fca20a72a0bea8980af99d86fbb573f6df6a98ea58c
                                                                • Instruction ID: 24f0dd4a0c73be3b2d1b16f6e459901816cacccf7c808b9b218362bedb53504b
                                                                • Opcode Fuzzy Hash: 6a43399540d15f33040c7fca20a72a0bea8980af99d86fbb573f6df6a98ea58c
                                                                • Instruction Fuzzy Hash: 6631E8A2F0E6E74BE726976D48754D53BD0EF11228B0F03FAC4F98F1E3AC5865028651
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2019711195.00007FFD9BB60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9bb60000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3043a5a8e2799521d01af38aca2289ad06c82601193a6478a69919a362102647
                                                                • Instruction ID: 6f6fde0db86108c866e831fff35e94a045db5fc9864c9d6c4778dfa6637b110f
                                                                • Opcode Fuzzy Hash: 3043a5a8e2799521d01af38aca2289ad06c82601193a6478a69919a362102647
                                                                • Instruction Fuzzy Hash: 38D13532A0EA8E8FEBA59A6858655F57B90FF16328B0901BFD45EC70E3D918AD04C341
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 18ee88038ce7fa785c058186e931da3596850311f32a6d19bd0d7768374c0b3f
                                                                • Instruction ID: a5401f1fecb3ba9aaeda5599ff18370efe58368f40e5a3f58c89c323cb1f7759
                                                                • Opcode Fuzzy Hash: 18ee88038ce7fa785c058186e931da3596850311f32a6d19bd0d7768374c0b3f
                                                                • Instruction Fuzzy Hash: 6D51D31AA0F6DA1FE722976C9C750D43FA0EF5222970901F7D4D8CF0E3ED4869499391
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 48e7b2c28043ebbb67dbb4b5bdce380eff62db37c7a116dd95d0ac109f09ca80
                                                                • Instruction ID: 99675dc03a5d4a64ee62b5d69740ab405970919751a2483ee5498c159efa5e09
                                                                • Opcode Fuzzy Hash: 48e7b2c28043ebbb67dbb4b5bdce380eff62db37c7a116dd95d0ac109f09ca80
                                                                • Instruction Fuzzy Hash: 4E714E3160EB8A4FD31AD738C8A59A03BE0EF56219B1901FBD4D9CB1A3ED157807C311
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d256ef64ea39bc7164f834337131b7168124b9ea3866c4ed81c4b4655346e997
                                                                • Instruction ID: 993d7df0e9d884ea6ea93ad8e2c6a5d2c138d2c3995e6d5d1151e11d07750237
                                                                • Opcode Fuzzy Hash: d256ef64ea39bc7164f834337131b7168124b9ea3866c4ed81c4b4655346e997
                                                                • Instruction Fuzzy Hash: 6FF0BE35918A8C8FDB51DF28C8291A87FE0FF25311B0601ABE809C7071DBA49A58CB81
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b3993db0a494b4e2ce4a851e36aef88a8b15247cc85b13903d7f0b67a5862f0d
                                                                • Instruction ID: db6d312db8d985863f9e16922c4ec776158190b77c5e8f7e9acf2573812c1b95
                                                                • Opcode Fuzzy Hash: b3993db0a494b4e2ce4a851e36aef88a8b15247cc85b13903d7f0b67a5862f0d
                                                                • Instruction Fuzzy Hash: 91413A71A0DB8C9FDB189F5C981A6A8BBE0FB95310F00416FE049C3252DB70B855CBC2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2016829964.00007FFD9B97D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B97D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9b97d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 64c042baabdc5ac5d729492d876e46ca92da7172ff6ac6aafe4fcf04153e3fda
                                                                • Instruction ID: 809966dd0c129e31b102c99b58a437a9e21e5dd3e77302906d8b8d63b3dc46a6
                                                                • Opcode Fuzzy Hash: 64c042baabdc5ac5d729492d876e46ca92da7172ff6ac6aafe4fcf04153e3fda
                                                                • Instruction Fuzzy Hash: C341167190EBC45FE7668B3998659523FF0EF57320B1A01DFD088CB1A3D625A846C7A2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c22e38e81377816a7b6d16faed610e6dd1cfe7ef650e72280b6e36a0b9a9b75f
                                                                • Instruction ID: 9eb9f75c7292575c9ff178c173c73ca646cbdae84137346cc70b24d2443750c8
                                                                • Opcode Fuzzy Hash: c22e38e81377816a7b6d16faed610e6dd1cfe7ef650e72280b6e36a0b9a9b75f
                                                                • Instruction Fuzzy Hash: B131F63190EB8C4FEB59DBA8D84A6E97FE0EF66320F0441AFD048C7162D664584ACB52
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                • Instruction ID: e3f7d4d4d58fbdedf9c6af5607cce508aaa45b5c74a85b115e698ec3b0c19091
                                                                • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                • Instruction Fuzzy Hash: 3D01A73020CB0C4FD748EF0CE051AA6B3E0FF85320F10056DE58AC36A1DA32E882CB45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2019711195.00007FFD9BB60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9bb60000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e05e1eade0d67447d9424f45fe0693aafc622e1e4e0e9707dbba244b5df99f75
                                                                • Instruction ID: 2a5bd8ed2cb5ed8cf173b9fde31bfd1be1d15cc0e94de8ee26bfb97160060002
                                                                • Opcode Fuzzy Hash: e05e1eade0d67447d9424f45fe0693aafc622e1e4e0e9707dbba244b5df99f75
                                                                • Instruction Fuzzy Hash: 54F09A32B0E9098FD769EA4CE4528A877E0FF5533471200BAE16DC71B3CA25EC408B40
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2019711195.00007FFD9BB60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9bb60000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fe0ce53600a0093831fe22d02e72cc1055f6578bc41294db06ec51813596ca66
                                                                • Instruction ID: a29a64ff74d616f5ed3101efe273cb934ce3ad40ad9c2fa0c269276b64b45825
                                                                • Opcode Fuzzy Hash: fe0ce53600a0093831fe22d02e72cc1055f6578bc41294db06ec51813596ca66
                                                                • Instruction Fuzzy Hash: 9EF0BE32A0E9498FD769EB4CE0628A873E0FF0532471200BAE15DC70A3CA26AC40C740
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2019711195.00007FFD9BB60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB60000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9bb60000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction ID: c566b0446571b1b202708e4a8accaff3b77d1c5caeb67e9b55a4e0150a067685
                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction Fuzzy Hash: 82E0E531B0C808CFDA78DA4CE0519A977E1FB9833571201BAD14EC75A1CA22ED518B80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2018203278.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_7ffd9ba90000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: O_^6$O_^<$O_^F$O_^I$O_^J
                                                                • API String ID: 0-2439779554
                                                                • Opcode ID: c6d3a8b0cf74e63db169cde05608f223816856023bfd5afab641cff7f2997cba
                                                                • Instruction ID: 2a1e00b4d1e4dfcac2fbf5b301f8843fa2fa8b2ec9e5317a795ac5dcc03f8833
                                                                • Opcode Fuzzy Hash: c6d3a8b0cf74e63db169cde05608f223816856023bfd5afab641cff7f2997cba
                                                                • Instruction Fuzzy Hash: 9921327B3084169ED316B7AEBC009D87380CFE827F34802B3E26ECF643D914648B8690
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2206704200.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c32f9d6635346d2e6b8469fc16093a629a32470eb033ba314e21d68687623f87
                                                                • Instruction ID: 6cdccfba7a0a9cdd4896582f6ecaa6c85e710822027ad3ab9a22ec581adfb7cb
                                                                • Opcode Fuzzy Hash: c32f9d6635346d2e6b8469fc16093a629a32470eb033ba314e21d68687623f87
                                                                • Instruction Fuzzy Hash: 7ED11432A0EACE0FEBA5AB6858655B57B91FF16318F0901FFD45EC70E3D928A905C341
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2202350062.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9ff7091e76b6909cb930d880c08ba804c5acc53c1510836516a659d1a3fc46bb
                                                                • Instruction ID: eba68d50c8c29a2d2e3012a08ca5b7177105d5c45f37f7c96cb22cc11764ea14
                                                                • Opcode Fuzzy Hash: 9ff7091e76b6909cb930d880c08ba804c5acc53c1510836516a659d1a3fc46bb
                                                                • Instruction Fuzzy Hash: 8D514972A0EAC94FE7159B5C9C295B87FE0EF56310F0401BFD0A9831A3DA64B9458BC2
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2201217468.00007FFD9B99D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B99D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9b99d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e4692974d555145df28fc9d4282badfd1bcffcc1d3c34d1cd5c43467d3ef5c12
                                                                • Instruction ID: 843cc846672fdfc37aaa9d4b58e44c419dc1987aea6c4c36b77ee11ef4629588
                                                                • Opcode Fuzzy Hash: e4692974d555145df28fc9d4282badfd1bcffcc1d3c34d1cd5c43467d3ef5c12
                                                                • Instruction Fuzzy Hash: 9E414B3150EFC89FE7A68B3998519623FF0EF52314B1605DFD089CB1A3D625A80AC792
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2202350062.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 09213d2541e595acaecb7a33cc05150631711713d97cd37f7c07d09fce02e9ef
                                                                • Instruction ID: f144ef68cbd3fbc61e66882d9f54141f866a41927dbe72b293ca7893bd500ae1
                                                                • Opcode Fuzzy Hash: 09213d2541e595acaecb7a33cc05150631711713d97cd37f7c07d09fce02e9ef
                                                                • Instruction Fuzzy Hash: CF21093190CB4C4FDB59DBACD84A7E97FE0EB96321F04426BD448C3152DA74A805CB92
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2202350062.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction ID: 17cf545b06c68c12749fae18c059a1fd3c0929f1bc305d672c46b898a287b68f
                                                                • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                • Instruction Fuzzy Hash: 8301A73120CB0C4FD748EF0CE051AA6B3E0FF85320F10056EE58AC36A1DA32E882CB45
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2206704200.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction ID: 2b7d983186ac8b342ef143f7b20347533711948212db3ddb9e9f3eee0f7c0e5b
                                                                • Opcode Fuzzy Hash: 65ddf82bc1de9b4cac1f7342b007d12a5ffdeb791ff7ffa414287a2e11141245
                                                                • Instruction Fuzzy Hash: BCF09032B0D9094FD769EA4CE45189477E0FF55324B1200BAE15DC71B3CA35EC408740
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2202350062.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b72a2130d37408c336ba0e1a75b071b1f214ea0f80abcb4d199e86b6a09438ae
                                                                • Instruction ID: d4290b755f860b474957a38aaa6ce9b1fc1efda8439047196164dbbc5c0d76a1
                                                                • Opcode Fuzzy Hash: b72a2130d37408c336ba0e1a75b071b1f214ea0f80abcb4d199e86b6a09438ae
                                                                • Instruction Fuzzy Hash: C2F02431508A8D8FCB09EF28946A4E57F60EF55205B4502FBE81DCB062DB615504CBC2
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2206704200.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction ID: f8e1fd036749847bda479d52db41c666d8f44e540076f2dd177018c485acfb5b
                                                                • Opcode Fuzzy Hash: 218580c49e25abb8330f7eaf565f20b386a9456a9fb043c66e0183da9ae0aabb
                                                                • Instruction Fuzzy Hash: 4FF0BE32A0E9498FD7A8EA4CE0618A873E0FF05328B1600BAE15DC70A3CA25AC40C740
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2206704200.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bb80000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction ID: 2dff48247507cb871ad432cab4ca7b8e5aeb9198aba82777103ccfbb354ce81a
                                                                • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                • Instruction Fuzzy Hash: 6CE01A31B0C8088FDAB9EA4CE0519A977E1FB98325B1201BBD14EC75B1CA32ED518B80
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2201217468.00007FFD9B99D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B99D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9b99d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a6e789e40d22f48bed9057cf57a8434b316b9bc26ca17628f0bed0edf1acb017
                                                                • Instruction ID: 682d6699a1769c9802c4b658afa56b9efb5f4805eec50c54ea87927875f5ad8c
                                                                • Opcode Fuzzy Hash: a6e789e40d22f48bed9057cf57a8434b316b9bc26ca17628f0bed0edf1acb017
                                                                • Instruction Fuzzy Hash: 02F01C30629D0D9FCAE5EF69C495D2137E1FB58300B211568D09EC7261D634F941CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.2202350062.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_7ffd9bab0000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: M_^4$M_^5$M_^@$M_^N$M_^U$M_^Y
                                                                • API String ID: 0-3990506085
                                                                • Opcode ID: a10203abb5c90ed1e212a8b3e4b305e25375224e9a1c98102282aa182a5a7975
                                                                • Instruction ID: e88ffeaacacaa6429b814de8c3f02bd082a981710e34438a64def18a6f316a0a
                                                                • Opcode Fuzzy Hash: a10203abb5c90ed1e212a8b3e4b305e25375224e9a1c98102282aa182a5a7975
                                                                • Instruction Fuzzy Hash: DC3119677085298AC32576BCB8559EC7784DFA833F78507F7E1A9CF093AC15608B8AC0