Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aXeuKjNXAK.ps1

Overview

General Information

Sample name:aXeuKjNXAK.ps1
renamed because original name is a hash value
Original sample name:04480551cbb529be713e1597520f7b01.ps1
Analysis ID:1636393
MD5:04480551cbb529be713e1597520f7b01
SHA1:40222fad92c6e2379494a313808edd911da11745
SHA256:1afcb4356a92e6a2ff29ace64b4aab69a097abce753c3a911a4ab7cbba88c0a9
Tags:ps1Rhadamanthysuser-abuse_ch
Infos:

Detection

RHADAMANTHYS
Score:100
Range:0 - 100
Confidence:100%

Signatures

Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected RHADAMANTHYS Stealer
.NET source code contains potential unpacker
Allocates memory in foreign processes
Checks if the current machine is a virtual machine (disk enumeration)
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dllhost Internet Connection
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 8236 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 8276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8584 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • svchost.exe (PID: 6128 cmdline: "C:\Windows\System32\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 4868 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • chrome.exe (PID: 1388 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" MD5: E81F54E6C1129887AEA47E7D092680BF)
          • chrome.exe (PID: 4068 cmdline: --user-data-dir="C:\Users\user\AppData\Local\Temp\chrE13A.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c462449b" MD5: E81F54E6C1129887AEA47E7D092680BF)
            • chrome.exe (PID: 6784 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2384,i,821600477713917837,7370031636428871877,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
          • msedge.exe (PID: 3476 cmdline: --user-data-dir="C:\Users\user\AppData\Local\Temp\chrEA73.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c7af6c55" MD5: 69222B8101B0601CC6663F8381E7E00F)
            • msedge.exe (PID: 5092 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2856 --field-trial-handle=2544,i,11316292491415656380,10520758499601027494,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
          • wmpnscfg.exe (PID: 7420 cmdline: "C:\Program Files\Windows Media Player\wmpnscfg.exe" MD5: F912FF78DE347834EA56CEB0E12F80EC)
            • dllhost.exe (PID: 7392 cmdline: "C:\Windows\system32\dllhost.exe" MD5: 08EB78E5BE019DF044C26B14703BD1FA)
            • dllhost.exe (PID: 9132 cmdline: "C:\Windows\system32\dllhost.exe" MD5: 08EB78E5BE019DF044C26B14703BD1FA)
          • RuntimeBroker.exe (PID: 3476 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • WerFault.exe (PID: 3432 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8584 -s 496 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • notepad.exe (PID: 8468 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\aXeuKjNXAK.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • elevation_service.exe (PID: 2284 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 4040 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 2968 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 3320 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • AvastBrowserUpdate.exe (PID: 7496 cmdline: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe MD5: 7DECF71FD9764F577E33AC091247EBCD)
    • svchost.exe (PID: 7848 cmdline: "C:\Windows\System32\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • svchost.exe (PID: 1812 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • chrome.exe (PID: 8532 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" MD5: E81F54E6C1129887AEA47E7D092680BF)
        • chrome.exe (PID: 2504 cmdline: --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBBEB.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c462449b" MD5: E81F54E6C1129887AEA47E7D092680BF)
          • chrome.exe (PID: 7312 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2220,i,13043762925271715218,17970797598959637433,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
        • msedge.exe (PID: 8872 cmdline: --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBF76.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c7af6c55" MD5: 69222B8101B0601CC6663F8381E7E00F)
          • msedge.exe (PID: 5892 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2036,i,18426108416146909067,2597470961201146140,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • elevation_service.exe (PID: 1300 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 1180 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 1524 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • elevation_service.exe (PID: 1676 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000F.00000003.2274035533.0000000002DB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    00000022.00000003.2754399709.0000000002FF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
      00000021.00000003.2753543787.00000000036F0000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000021.00000003.2749552874.00000000023E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
          00000021.00000002.2757511608.00000000030D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            15.3.svchost.exe.5160000.6.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              34.3.svchost.exe.5480000.6.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                33.3.AvastBrowserUpdate.exe.36f0000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  15.3.svchost.exe.5380000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    34.3.svchost.exe.56a0000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 2 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5500, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", ProcessId: 8236, ProcessName: powershell.exe
                      Source: Network ConnectionAuthor: bartblaze: Data: DestinationIp: 91.240.118.2, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\dllhost.exe, Initiated: true, ProcessId: 7392, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49743
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 8584, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 6128, ProcessName: svchost.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5500, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1", ProcessId: 8236, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe, ParentImage: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe, ParentProcessId: 7496, ParentProcessName: AvastBrowserUpdate.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 7848, ProcessName: svchost.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-12T18:29:15.989384+010028548242Potentially Bad Traffic91.240.118.29769192.168.2.549732TCP
                      2025-03-12T18:29:25.152431+010028548242Potentially Bad Traffic91.240.118.29769192.168.2.549742TCP
                      2025-03-12T18:30:09.944580+010028548242Potentially Bad Traffic91.240.118.29769192.168.2.549762TCP
                      2025-03-12T18:30:19.565580+010028548242Potentially Bad Traffic91.240.118.29769192.168.2.549763TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-12T18:28:48.770969+010028330221A Network Trojan was detected104.21.35.50443192.168.2.549717TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-12T18:28:53.982262+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549718TCP
                      2025-03-12T18:29:15.989384+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549732TCP
                      2025-03-12T18:29:25.152431+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549742TCP
                      2025-03-12T18:29:33.635556+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549743TCP
                      2025-03-12T18:29:43.771082+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549746TCP
                      2025-03-12T18:29:46.181321+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549745TCP
                      2025-03-12T18:29:52.197882+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549747TCP
                      2025-03-12T18:30:09.944580+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549762TCP
                      2025-03-12T18:30:19.565580+010028548021Domain Observed Used for C2 Detected91.240.118.29769192.168.2.549763TCP
                      2025-03-12T18:30:24.187003+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549764TCP
                      2025-03-12T18:30:31.742133+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549765TCP
                      2025-03-12T18:30:39.435235+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549766TCP
                      2025-03-12T18:30:50.200927+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549767TCP
                      2025-03-12T18:30:58.254666+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549768TCP
                      2025-03-12T18:31:14.782474+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.549769TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: aXeuKjNXAK.ps1Virustotal: Detection: 11%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B6B88 CryptUnprotectData,19_2_00007DF4111B6B88
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC83838 calloc,CryptProtectData,LocalFree,CreateFileW,WriteFile,CloseHandle,31_3_00007DF4EDC83838
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_db16848d-9
                      Source: unknownHTTPS traffic detected: 104.21.35.50:443 -> 192.168.2.5:49717 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49745 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49764 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49765 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49766 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49767 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49768 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49769 version: TLS 1.2
                      Source: Binary string: wkernel32.pdb source: svchost.exe, 0000000F.00000003.2277962557.0000000005280000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277870250.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: svchost.exe, 0000000F.00000003.2276158334.0000000005350000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2275101258.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: svchost.exe, 0000000F.00000003.2277690954.0000000005300000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277517345.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: svchost.exe, 0000000F.00000003.2276158334.0000000005350000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2275101258.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: svchost.exe, 0000000F.00000003.2277690954.0000000005300000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277517345.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: svchost.exe, 0000000F.00000003.2277962557.0000000005280000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277870250.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B1618 FindFirstFileW,DeleteFileW,FindNextFileW,RemoveDirectoryW,19_2_00007DF4111B1618
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\AdobeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 0738C6F4h0_2_0738C4B8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 0738C6F4h0_2_0738C4C8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 0738BB7Fh0_2_0738BB20
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 0738BB7Fh0_2_0738BB11
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 07832E00h0_2_07832A70
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 07832E00h0_2_07832B7E
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4x nop then jmp 07832E00h0_2_07832A60
                      Source: C:\Windows\System32\svchost.exeCode function: 4x nop then dec esp19_2_000001A7A5160511
                      Source: C:\Windows\System32\svchost.exeCode function: 4x nop then dec esp19_2_00007DF4111C25B1
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 4x nop then dec esp20_2_0000026D965025B1
                      Source: chrome.exeMemory has grown: Private usage: 3MB later: 25MB

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49718
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49732
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49742
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49746
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49743
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49745
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49747
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49762
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:9769 -> 192.168.2.5:49763
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49764
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49768
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49769
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49766
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49765
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.5:49767
                      Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 91.240.118.2 9769
                      Source: global trafficTCP traffic: 192.168.2.5:49718 -> 91.240.118.2:9769
                      Source: global trafficHTTP traffic detected: GET /code.bin HTTP/1.1Host: timing.silver-card-maker.cloudConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /RIRzat8.png HTTP/1.1Host: i.imgur.comAccept: */*
                      Source: Joe Sandbox ViewIP Address: 94.198.159.10 94.198.159.10
                      Source: Joe Sandbox ViewIP Address: 194.58.203.20 194.58.203.20
                      Source: Joe Sandbox ViewIP Address: 169.229.128.134 169.229.128.134
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Joe Sandbox ViewJA3 fingerprint: caec7ddf6889590d999d7ca1b76373b6
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 91.240.118.2:9769 -> 192.168.2.5:49732
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 91.240.118.2:9769 -> 192.168.2.5:49742
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 91.240.118.2:9769 -> 192.168.2.5:49762
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 91.240.118.2:9769 -> 192.168.2.5:49763
                      Source: Network trafficSuricata IDS: 2833022 - Severity 1 - ETPRO MALWARE Possible Malicious Second Stage Download with Terse Headers : 104.21.35.50:443 -> 192.168.2.5:49717
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.2
                      Source: global trafficHTTP traffic detected: GET /code.bin HTTP/1.1Host: timing.silver-card-maker.cloudConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /RIRzat8.png HTTP/1.1Host: i.imgur.comAccept: */*
                      Source: global trafficDNS traffic detected: DNS query: timing.silver-card-maker.cloud
                      Source: global trafficDNS traffic detected: DNS query: ts1.aco.net
                      Source: global trafficDNS traffic detected: DNS query: gbg1.ntp.se
                      Source: global trafficDNS traffic detected: DNS query: ntp.time.in.ua
                      Source: global trafficDNS traffic detected: DNS query: ntp.time.nl
                      Source: global trafficDNS traffic detected: DNS query: x.ns.gin.ntt.net
                      Source: global trafficDNS traffic detected: DNS query: ntp.nict.jp
                      Source: global trafficDNS traffic detected: DNS query: time.cloudflare.com
                      Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
                      Source: global trafficDNS traffic detected: DNS query: i.imgur.com
                      Source: global trafficDNS traffic detected: DNS query: ntp1.net.berkeley.edu
                      Source: global trafficDNS traffic detected: DNS query: time.google.com
                      Source: global trafficDNS traffic detected: DNS query: time.windows.com
                      Source: global trafficDNS traffic detected: DNS query: time.facebook.com
                      Source: svchost.exe, 00000013.00000003.2515832446.000001A7A5A0B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2536834144.000001A7A8712000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:8000/91df5146/c462449b
                      Source: svchost.exe, 00000013.00000003.2515832446.000001A7A5A0B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2536834144.000001A7A8712000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:8000/91df5146/c7af6c55
                      Source: powershell.exe, 00000000.00000002.2294552215.0000000007630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 00000000.00000002.2262639105.0000000005041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: svchost.exe, 00000013.00000002.2752456509.000001A7A5AE9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2516338603.000001A7A5ADF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2752547196.000001A7A5AFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.240.118.2:9769/78fc5131525a9e8d335b1/a4ams8gi.61mn6
                      Source: svchost.exe, 0000000F.00000002.2333459642.000000000310C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2750850875.000001A7A5160000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://91.240.118.2:9769/78fc5131525a9e8d335b1/a4ams8gi.61mn6kernelbasentdllkernel32GetProcessMitig
                      Source: svchost.exe, 0000000F.00000002.2333058203.00000000029BC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://91.240.118.2:9769/78fc5131525a9e8d335b1/a4ams8gi.61mn6x
                      Source: powershell.exe, 00000000.00000002.2262639105.0000000005041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: svchost.exe, 00000013.00000003.2515832446.000001A7A5A0B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2536834144.000001A7A8712000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/cr/report
                      Source: svchost.exe, 0000000F.00000003.2296456565.000000000319F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-query
                      Source: svchost.exe, 0000000F.00000003.2296456565.000000000319F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
                      Source: svchost.exe, 00000013.00000003.2516189282.000001A7A5A0A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2516092825.000001A7A5A0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                      Source: svchost.exe, 00000013.00000003.2516189282.000001A7A5A0A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2516092825.000001A7A5A0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                      Source: unknownHTTPS traffic detected: 104.21.35.50:443 -> 192.168.2.5:49717 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49745 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49764 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49765 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49766 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49767 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49768 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.5:49769 version: TLS 1.2
                      Source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_4ccbfd50-7
                      Source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_a8837bee-5
                      Source: Yara matchFile source: 15.3.svchost.exe.5160000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.3.svchost.exe.5480000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.3.AvastBrowserUpdate.exe.36f0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.3.svchost.exe.5380000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.3.svchost.exe.56a0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.3.AvastBrowserUpdate.exe.36f0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.3.AvastBrowserUpdate.exe.34d0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000021.00000003.2753543787.00000000036F0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000003.2757928992.00000000056A0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000003.2757742658.0000000005480000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000003.2753269754.00000000034D0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6128, type: MEMORYSTR
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B1364 CreateDesktopW,CreateProcessW,GetExitCodeProcess,TerminateProcess,19_2_00007DF4111B1364

                      System Summary

                      barindex
                      Source: Process Memory Space: powershell.exe PID: 8236, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_000001A7A51615C0 NtAcceptConnectPort,19_2_000001A7A51615C0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_000001A7A5161CF4 NtAcceptConnectPort,CloseHandle,19_2_000001A7A5161CF4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF0B8 NtAcceptConnectPort,19_2_00007DF4111BF0B8
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BEFAC NtAcceptConnectPort,19_2_00007DF4111BEFAC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BFFDC RtlDosPathNameToNtPathName_U,NtAcceptConnectPort,NtAcceptConnectPort,free,19_2_00007DF4111BFFDC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BEFCC NtAcceptConnectPort,19_2_00007DF4111BEFCC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF050 NtAcceptConnectPort,19_2_00007DF4111BF050
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111C0188 NtAcceptConnectPort,free,19_2_00007DF4111C0188
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF224 NtAcceptConnectPort,19_2_00007DF4111BF224
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF244 NtAcceptConnectPort,19_2_00007DF4111BF244
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF3FC CreateFileMappingW,MapViewOfFile,DuplicateHandle,NtAcceptConnectPort,19_2_00007DF4111BF3FC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BF76C calloc,DuplicateHandle,NtAcceptConnectPort,free,NtAcceptConnectPort,NtAcceptConnectPort,19_2_00007DF4111BF76C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BEEF0 NtAcceptConnectPort,19_2_00007DF4111BEEF0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964FF19C NtAcceptConnectPort,20_2_0000026D964FF19C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964FEF64 NtAcceptConnectPort,20_2_0000026D964FEF64
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,31_3_00007DF4EDC91CE8
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,31_3_00007DF4EDC91CE8
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,31_3_00007DF4EDC91958
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,31_3_00007DF4EDC91958
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,31_3_00007DF4EDC91958
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,31_3_00007DF4EDC91958
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC81AD0 NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,CreateProcessW,free,CreateFileW,WriteFile,CloseHandle,RegCreateKeyExW,RegSetValueExW,RegCloseKey,free,31_3_00007DF4EDC81AD0
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,31_3_00007DF4EDC91CE8
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC91CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,31_3_00007DF4EDC91CE8
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8147C CoInitializeEx,RegQueryValueExW,CoInitializeSecurity,CoCreateInstance,GetVolumeInformationW,CoUninitialize,NtQueryInformationProcess,31_3_00007DF4EDC8147C
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_030070390_2_03007039
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_030070480_2_03007048
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_03006AA80_2_03006AA8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_03006AB80_2_03006AB8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0300AC880_2_0300AC88
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0738E8100_2_0738E810
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_07388E500_2_07388E50
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_078398080_2_07839808
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A1BDD19_3_000001A7A51A1BDD
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A27D319_3_000001A7A51A27D3
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A5EC819_3_000001A7A51A5EC8
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A55C819_3_000001A7A51A55C8
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A594819_3_000001A7A51A5948
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A4A8419_3_000001A7A51A4A84
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A2C7319_3_000001A7A51A2C73
                      Source: C:\Windows\System32\svchost.exeCode function: 19_3_000001A7A51A252E19_3_000001A7A51A252E
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_000001A7A5160C7019_2_000001A7A5160C70
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111A404019_2_00007DF4111A4040
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B136419_2_00007DF4111B1364
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41119286C19_2_00007DF41119286C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111A7E7419_2_00007DF4111A7E74
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111E40B419_2_00007DF4111E40B4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111EF0C419_2_00007DF4111EF0C4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111FD10019_2_00007DF4111FD100
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411195FA019_2_00007DF411195FA0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111E6FB019_2_00007DF4111E6FB0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127DFB419_2_00007DF41127DFB4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127EFBC19_2_00007DF41127EFBC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41128C01019_2_00007DF41128C010
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41119105819_2_00007DF411191058
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111ED05019_2_00007DF4111ED050
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127F35419_2_00007DF41127F354
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111F034419_2_00007DF4111F0344
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41126E1EC19_2_00007DF41126E1EC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111FD21019_2_00007DF4111FD210
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111C525419_2_00007DF4111C5254
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127C4B019_2_00007DF41127C4B0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127E4EC19_2_00007DF41127E4EC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41128C52C19_2_00007DF41128C52C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111A250019_2_00007DF4111A2500
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111AF40819_2_00007DF4111AF408
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111E56C019_2_00007DF4111E56C0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41120D61019_2_00007DF41120D610
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111FD66819_2_00007DF4111FD668
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111BD8B819_2_00007DF4111BD8B8
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127E90819_2_00007DF41127E908
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111D891019_2_00007DF4111D8910
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41123A79019_2_00007DF41123A790
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41120178419_2_00007DF411201784
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411272A7C19_2_00007DF411272A7C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411210AE419_2_00007DF411210AE4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B1B5419_2_00007DF4111B1B54
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41119F9A019_2_00007DF41119F9A0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B198C19_2_00007DF4111B198C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127A9E419_2_00007DF41127A9E4
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111E5A0C19_2_00007DF4111E5A0C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41125DC7819_2_00007DF41125DC78
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41129BD3019_2_00007DF41129BD30
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111E3D2819_2_00007DF4111E3D28
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411298D6419_2_00007DF411298D64
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411205BEC19_2_00007DF411205BEC
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411284C7019_2_00007DF411284C70
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111F0EA019_2_00007DF4111F0EA0
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111FCF2419_2_00007DF4111FCF24
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411277D9419_2_00007DF411277D94
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111CCD7419_2_00007DF4111CCD74
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411231D7C19_2_00007DF411231D7C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4112B7E4C19_2_00007DF4112B7E4C
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41127EE3C19_2_00007DF41127EE3C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964F1B5420_2_0000026D964F1B54
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D96545BEC20_2_0000026D96545BEC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9659DC7820_2_0000026D9659DC78
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9651891020_2_0000026D96518910
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BE90820_2_0000026D965BE908
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964DF9A020_2_0000026D964DF9A0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964F198C20_2_0000026D964F198C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BA9E420_2_0000026D965BA9E4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D96525A0C20_2_0000026D96525A0C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965B2A7C20_2_0000026D965B2A7C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9657A79020_2_0000026D9657A790
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9654178420_2_0000026D96541784
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964FD8B820_2_0000026D964FD8B8
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964D286C20_2_0000026D964D286C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965CC52C20_2_0000026D965CC52C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BE4EC20_2_0000026D965BE4EC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964E250020_2_0000026D964E2500
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9654D61020_2_0000026D9654D610
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965256C020_2_0000026D965256C0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9653D66820_2_0000026D9653D668
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9653034420_2_0000026D96530344
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964F136420_2_0000026D964F1364
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BF35420_2_0000026D965BF354
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964EF40820_2_0000026D964EF408
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9653D10020_2_0000026D9653D100
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9653D21020_2_0000026D9653D210
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965AE1EC20_2_0000026D965AE1EC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9653CF2420_2_0000026D9653CF24
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964D5FA020_2_0000026D964D5FA0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D96526FB020_2_0000026D96526FB0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BEFBC20_2_0000026D965BEFBC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BDFB420_2_0000026D965BDFB4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965CC01020_2_0000026D965CC010
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965FF00820_2_0000026D965FF008
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9652F0C420_2_0000026D9652F0C4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965240B420_2_0000026D965240B4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964D105820_2_0000026D964D1058
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9652D05020_2_0000026D9652D050
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D96523D2820_2_0000026D96523D28
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965B7D9420_2_0000026D965B7D94
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965D8D6420_2_0000026D965D8D64
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D9650CD7420_2_0000026D9650CD74
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D965BEE3C20_2_0000026D965BEE3C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D96530EA020_2_0000026D96530EA0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 20_2_0000026D964E7E7420_2_0000026D964E7E74
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9220431_3_00007DF4EDC92204
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9220431_3_00007DF4EDC92204
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC94EFC31_3_00007DF4EDC94EFC
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9392C31_3_00007DF4EDC9392C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9252031_3_00007DF4EDC92520
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC81AD031_3_00007DF4EDC81AD0
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8147C31_3_00007DF4EDC8147C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8383831_3_00007DF4EDC83838
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9392C31_3_00007DF4EDC9392C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9394231_3_00007DF4EDC93942
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9392C31_3_00007DF4EDC9392C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8554031_3_00007DF4EDC85540
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC85F6831_3_00007DF4EDC85F68
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8AD5431_3_00007DF4EDC8AD54
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8BD1031_3_00007DF4EDC8BD10
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9392C31_3_00007DF4EDC9392C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8A32831_3_00007DF4EDC8A328
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9392C31_3_00007DF4EDC9392C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8A91831_3_00007DF4EDC8A918
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9252031_3_00007DF4EDC92520
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8FB1431_3_00007DF4EDC8FB14
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8B0B431_3_00007DF4EDC8B0B4
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC836F031_3_00007DF4EDC836F0
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8769C31_3_00007DF4EDC8769C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8CC4431_3_00007DF4EDC8CC44
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8C64031_3_00007DF4EDC8C640
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8323C31_3_00007DF4EDC8323C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8F25431_3_00007DF4EDC8F254
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9220431_3_00007DF4EDC92204
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC9220431_3_00007DF4EDC92204
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC907E831_3_00007DF4EDC907E8
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC859DC31_3_00007DF4EDC859DC
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC89FAC31_3_00007DF4EDC89FAC
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8B5A031_3_00007DF4EDC8B5A0
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_0000025297371F4031_3_0000025297371F40
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737028331_3_0000025297370283
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737366C31_3_000002529737366C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_000002529737171631_3_0000025297371716
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8584 -s 496
                      Source: Process Memory Space: powershell.exe PID: 8236, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: 19.3.svchost.exe.1a7a5abc070.3.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.0.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.6.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.2.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.1.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.7.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.5.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.9.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.8.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: 19.3.svchost.exe.1a7a5abc070.4.raw.unpack, CallWrapper.csSuspicious method names: .CallWrapper.GetPayload
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@82/282@20/18
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF41119286C CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,SuspendThread,19_2_00007DF41119286C
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeCode function: 31_3_00007DF4EDC8147C CoInitializeEx,RegQueryValueExW,CoInitializeSecurity,CoCreateInstance,GetVolumeInformationW,CoUninitialize,NtQueryInformationProcess,31_3_00007DF4EDC8147C
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeMutant created: \Sessions\1\BaseNamedObjects\Global\GS-1-5-21-2246122658-3693405117-2476756634-1003{D19BAF17-7C87-467E-8D63-6C4B1C836373}
                      Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-6b4baae3-f593-a8f5a4-ce76808d750a}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8276:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Yhsmji
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3432:64:WilError_03
                      Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-b634f2b7-3877-b1c5bf-de8588539928}
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bckbe5d.oay.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: svchost.exe, 00000013.00000003.2514086129.000001A7A5A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2478793040.000001A7A5A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2514753180.000001A7A8734000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2514999640.000001A7A8734000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: svchost.exe, 00000013.00000002.2753362695.00007DF4112C1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2387033906.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749851466.000001A7A9550000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2749373620.000001A7A93D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.2388113163.000001A7A9010000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, svchost.exe, 00000024.00000003.2957970636.000001A33B200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: aXeuKjNXAK.ps1Virustotal: Detection: 11%
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\aXeuKjNXAK.ps1"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\aXeuKjNXAK.ps1"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8584 -s 496
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrE13A.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c462449b"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2384,i,821600477713917837,7370031636428871877,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:3
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrEA73.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c7af6c55"
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2856 --field-trial-handle=2544,i,11316292491415656380,10520758499601027494,262144 /prefetch:3
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpnscfg.exe "C:\Program Files\Windows Media Player\wmpnscfg.exe"
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBBEB.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c462449b"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2220,i,13043762925271715218,17970797598959637433,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBF76.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c7af6c55"
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2036,i,18426108416146909067,2597470961201146140,262144 /prefetch:3
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrE13A.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c462449b"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrEA73.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/91df5146/c7af6c55"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpnscfg.exe "C:\Program Files\Windows Media Player\wmpnscfg.exe"Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2384,i,821600477713917837,7370031636428871877,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:3Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2856 --field-trial-handle=2544,i,11316292491415656380,10520758499601027494,262144 /prefetch:3Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBBEB.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c462449b"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chrBF76.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/83f8569a/c7af6c55"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2220,i,13043762925271715218,17970797598959637433,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2036,i,18426108416146909067,2597470961201146140,262144 /prefetch:3
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: mswsock.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: uxtheme.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: secur32.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: sspicli.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: dpapi.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: taskschd.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: xmllite.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: taskschd.dll
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msi.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: netapi32.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wtsapi32.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msimg32.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wininet.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wkscli.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cscapi.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbghelp.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbgcore.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbghelp.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbgcore.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: windowscodecs.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: powrprof.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: umpdc.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: devobj.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: drprov.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntlanman.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: davclnt.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: davhlpr.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cscapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: sxs.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dpapi.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dll
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: rmclient.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: userdeviceregistration.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: dsreg.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\dllhost.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: aXeuKjNXAK.ps1Static file information: File size 10116574 > 1048576
                      Source: Binary string: wkernel32.pdb source: svchost.exe, 0000000F.00000003.2277962557.0000000005280000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277870250.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: svchost.exe, 0000000F.00000003.2276158334.0000000005350000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2275101258.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: svchost.exe, 0000000F.00000003.2277690954.0000000005300000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277517345.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: svchost.exe, 0000000F.00000003.2276158334.0000000005350000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2275101258.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: svchost.exe, 0000000F.00000003.2277690954.0000000005300000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277517345.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: svchost.exe, 0000000F.00000003.2277962557.0000000005280000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2277870250.0000000005160000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: svchost.exe, 0000000F.00000003.2278312261.0000000005380000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 19.3.svchost.exe.1a7a5abc070.6.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.6.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.3.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.3.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.2.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.2.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.0.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.0.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.1.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.1.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.7.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.7.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.4.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.4.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.9.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.9.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.8.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.8.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: 19.3.svchost.exe.1a7a5abc070.5.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 19.3.svchost.exe.1a7a5abc070.5.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($cip); $ufi = New-Object byte[] $ct.Length; for ($i=0;$i -lt $ct.Length;$i++) { $ufi[$i] = $ct[$i] -bxor $key[$i % $key.Length] }; return [System.Text.Encoding]::UTF8.GetString($ufi);
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04FDEED8 push esp; retf 0_2_04FDEEE5
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_04FDEBA2 pushad ; retf 0_2_04FDEC35
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0738DF29 push esp; ret 0_2_0738DF2A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0738D746 push eax; ret 0_2_0738D747
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0738DFB1 push eax; ret 0_2_0738DFB9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0738E07E push esp; ret 0_2_0738E07F
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_078337FB push esp; ret 0_2_078337FC
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_078330E1 push esp; ret 0_2_078330E7
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FE550 push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FDF0D push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FDF30 push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FE1E0 push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FE180 push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_094FE6D0 push 5D000000h; ret 0_2_094FE7E1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03104D5E push esi; ret 14_2_03104D69
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03100F6A push eax; ret 14_2_03100F75
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03103F89 push edi; iretd 14_2_03103F96
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03103FD4 push ss; retf 14_2_03103FF5
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_031021DC push eax; ret 14_2_031021DD
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03102C39 push ecx; ret 14_2_03102C59
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_0310525D push es; ret 14_2_03105264
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_031010F9 push FFFFFF82h; iretd 14_2_031010FB
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_031044F9 push edx; retf 14_2_031044FC
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_031028EC push edi; ret 14_2_031028F8
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F2CB9 push ecx; ret 15_3_029F2CD9
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F52DD push es; ret 15_3_029F52E4
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F4009 push edi; iretd 15_3_029F4016
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F225C push eax; ret 15_3_029F225D
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F4054 push ss; retf 15_3_029F4075
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F4DDE push esi; ret 15_3_029F4DE9
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F0FEA push eax; ret 15_3_029F0FF5
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeFile created: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeJump to dropped file
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeFile created: C:\Users\user\AppData\Roaming\Avt\goopdate.dllJump to dropped file
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\avt CfgData
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\svchost.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAPI/Special instruction interceptor: Address: 7FF84F7AD044
                      Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FF84F7AD044
                      Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 56BB83A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeAPI/Special instruction interceptor: Address: 7FF84F7AD044
                      Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 57CB83A
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EVERYWHERE.EXEFIDDLER.EXEIDA.EXEIDA64.EXEIMMU
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHA5
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TORUNS.EXEDUMPCAP.EXEDE4
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: VBoxGuest
                      Source: C:\Windows\SysWOW64\svchost.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\vboxservice.exe
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\vboxtray.exe
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxMouse.sys
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: VBoxTrayIPC
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxSF.sys
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\vboxhook.dll
                      Source: C:\Windows\SysWOW64\svchost.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosDate
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: \pipe\VBoxTrayIPC
                      Source: C:\Windows\SysWOW64\svchost.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxVideo.sys
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: VBoxMiniRdrDN
                      Source: C:\Windows\SysWOW64\svchost.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxGuest.sys
                      Source: C:\Windows\SysWOW64\svchost.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411294248 sldt word ptr [eax]19_2_00007DF411294248
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6819Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2702Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeJump to dropped file
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Avt\goopdate.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 9168Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B1618 FindFirstFileW,DeleteFileW,FindNextFileW,RemoveDirectoryW,19_2_00007DF4111B1618
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF411192514 GetSystemInfo,19_2_00007DF411192514
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\AdobeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $HwezPbTrqRzEPpxUzbr = ((($FawqemuyBmsawwOHZu + -473198) - 98784) * (((((((-7341 + 14334) - $tGRbbBukDU) - ((((($WiXVRGlNgyS + 169) * 34625)) - ((((3 * -50350) - $YTANJGNkttH) * $KnBvQNIHSMXTUJskYJcnB) - $YTANJGNkttH)))) - $feiJBcWxyNQPnmQF)) - (((((25 * -348) + -330) - $QUsnODxygywaKYx)) - ((((($aAgxKPHokoeshJGNDq - $WOwGSKBvgxtdHIYcrZdL) - $BkyEihFJBoLlc) + $ukDbGXPMFWbsRJLfkfBGE) * $VnIeYxcKsDXfxF) + $lxbwosjsc)))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $BkyEihFJBoLlc = (($KnBvQNIHSMXTUJskYJcnB * (((((($feiJBcWxyNQPnmQF + $BhnfWCjCT) + -878002) * (((((-811 + $FetNiyptiqwiiSW) - (((((($FawqemuyBmsawwOHZu + $SNDYinOatvVRp) + 75) * $ukDbGXPMFWbsRJLfkfBGE) + $VkqtaafnKLPLPjl) + $VkqtaafnKLPLPjl))) - 416603) - $BDXwthxItR)))) - (((((($xJgLSmCGExgpDeuwGs + $aUvphQevd) - -9438) - (((((7648 * 57) - $FetNiyptiqwiiSW) + -759711) * $DDnVDvxasyZGaH))) * $isXPtwPNlizAuJTRNJSR)) * ((((($tGRbbBukDU * $uZjFCHCuwgMRmVuD) + $feiJBcWxyNQPnmQF) - $uZjFCHCuwgMRmVuD) * $uZjFCHCuwgMRmVuD) + 544))))) * -22)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $ejrThZkPCAQIEm = ((((($tGRbbBukDU * -464109) * ((((4 + $QLizooERIru) * $FawqemuyBmsawwOHZu) - $VkqtaafnKLPLPjl))) + $KTYbPJqBBiAcptx) + $SNDYinOatvVRp) - $KTYbPJqBBiAcptx)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((4563 -ge $FawqemuyBmsawwOHZu) -or ($LEmnzzpePRBsXpSczHuel -le $coHFkxmaSTBQmOca) -or (997 -eq -39824)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = ((($keEoMANEKklErqkS * -7998) + $bvNcHjfwFu) + $QLizooERIru)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $jRiEEMSDahtDXRX = ((((($wdiOzNWDJbtitMpyhtP + $KTYbPJqBBiAcptx) + $ljKWwLiwvNQFdMQABBdY) * $BpmVieflXB)) + (((((($eSGXcVDTWCrHpHdd - -17683) - ((((((149040 * 954) + 97) * (((((-7 * 74461) * $nThZRFHczodCQIjn) * 991800) + $xVAhdipiHTyyKaaPS))) - (((((($DwXHSGGMiILc + -760) * 908) + $pZTjfifajVwieNsXpLR) * -511) + -552605))) - ((($WOwGSKBvgxtdHIYcrZdL - -7) * $bABhRHoDjnMXwTzxW))))) * ((((1 * $KnBvQNIHSMXTUJskYJcnB) * -89) + (((((($FawqemuyBmsawwOHZu + 83) - 32639) - $ukDbGXPMFWbsRJLfkfBGE) - 3918) + -62436))))) - $feiJBcWxyNQPnmQF)) * ((-9 * 79) + -55517)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $MuNChZebK = ((((((8960 + $FawqemuyBmsawwOHZu) + ((((($SDnIVLdAPekHPz * $zYPpmoxLomkKZJtCicT) + ((((-205 + 4) - -152) + 4224)))) * ((($jRiEEMSDahtDXRX * -123) + $yycCLpGMIMmv) * -899149)))) - (((($gsRwOcOmjjUpCXTcsHn * ((((((-652 + -5405) + -7) - $aAgxKPHokoeshJGNDq) * $FawqemuyBmsawwOHZu) + $ejrThZkPCAQIEm))) - $eaEMrGlxnEWQmjDHR) * ((($YjwYiuvYpNuZt - $aUvphQevd) - 6031))))) + (((-59716 * ((((-516 * -5) * -892384) - 5))) * $aUvphQevd)))) * ((((((($QLizooERIru - 746) + 807744) - 48626) - $VkqtaafnKLPLPjl) - 37443)) * ((((($gsRwOcOmjjUpCXTcsHn + 700) + 65) + 39878) * $cvZBawIacuX) + $AAhEbgCCcmlT)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $OSmhCCiVVcvaoDlx = ((((($YTANJGNkttH + ((((($AAhEbgCCcmlT + $FawqemuyBmsawwOHZu) + $ukDbGXPMFWbsRJLfkfBGE) + $AAhEbgCCcmlT) * -84239))) + $FawqemuyBmsawwOHZu) - (((((($BkyEihFJBoLlc + 353370) - 49) * -6) - -6295) * $xJgLSmCGExgpDeuwGs))) + $DDnVDvxasyZGaH) + ((((((24 - $feiJBcWxyNQPnmQF) - $ccHRSZAjBHKVLIoy) + $eaEMrGlxnEWQmjDHR) * 287115) + -15)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($FawqemuyBmsawwOHZu -gt $vqIPLFNhrODYOdbmYl) -or ($LEcjISrNC -ne $ukDbGXPMFWbsRJLfkfBGE) -or ($aAgxKPHokoeshJGNDq -le $OSmhCCiVVcvaoDlx)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $DDnVDvxasyZGaH = (($DDnVDvxasyZGaH - (((((((6 + $WjSVLmvOVInmUrVgua) - $eaEMrGlxnEWQmjDHR) * -467) * ((((((-10731 * $SNDYinOatvVRp) * ((($LEmnzzpePRBsXpSczHuel - 2) * $oeDgCMrdUrTnYrZ))) * $KnBvQNIHSMXTUJskYJcnB) - $feiJBcWxyNQPnmQF) - $HPAUgfqkInsquNcv)))) + ((((46 * $FawqemuyBmsawwOHZu) * 53) * -50) - 10118)))) * ((((-780 * $vqIPLFNhrODYOdbmYl) * ((((((((2 + (((((($LEmnzzpePRBsXpSczHuel - $tGRbbBukDU) + $WiXVRGlNgyS) * -244449) * $HjkAVKEKmaLVbtBcFT) * 859))) - $DDnVDvxasyZGaH) + $tGRbbBukDU) * 799) * -8652)) * (((($YTANJGNkttH * $YTANJGNkttH) * -85373) * -802210) - $tGRbbBukDU)))) * ((((((($OSmhCCiVVcvaoDlx + ((((((-2031 - 4331) - -2) * $HPAUgfqkInsquNcv) + $KTYbPJqBBiAcptx) - -244607))) * $BkyEihFJBoLlc) + $BDXwthxItR) * 8)) * (($cvZBawIacuX * $SNDYinOatvVRp) - 727))))))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $LEcjISrNC = (((((((-809 + $SNDYinOatvVRp) - $ejrThZkPCAQIEm) * (((((($QLizooERIru * $VkqtaafnKLPLPjl) * $HjkAVKEKmaLVbtBcFT) + -7) + $keEoMANEKklErqkS) * 848498))) + (((($FawqemuyBmsawwOHZu + $WjSVLmvOVInmUrVgua) - $lxbwosjsc) + -594))) + $pZTjfifajVwieNsXpLR)) * ((((($WjSVLmvOVInmUrVgua + $ccHRSZAjBHKVLIoy) * $QLizooERIru) - 4) * -61874) * $xJgLSmCGExgpDeuwGs))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $tFbknODqZPoYEsW = ((((($FawqemuyBmsawwOHZu + -9065) - $AAhEbgCCcmlT) * $HjkAVKEKmaLVbtBcFT) + $LEcjISrNC) + -215)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $KnBvQNIHSMXTUJskYJcnB = ((((-6972 - $FawqemuyBmsawwOHZu) - -5) - -9588) + $aUvphQevd)
                      Source: svchost.exe, 00000013.00000002.2751171982.000001A7A5213000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@$#
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((51452 -le $xJgLSmCGExgpDeuwGs) -and ($FetNiyptiqwiiSW -gt $FawqemuyBmsawwOHZu)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (((($tGRbbBukDU + $KTYbPJqBBiAcptx) * -93) + (((((($BhnfWCjCT + -169937) * $aUvphQevd) + $BkyEihFJBoLlc) * -81) * 1))) + -993)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $OSmhCCiVVcvaoDlx = (((($FawqemuyBmsawwOHZu * 29) + ((((((-86323 - $bvNcHjfwFu) * 9221) * $tGRbbBukDU) * 172) - 9380)))) * (((($LEmnzzpePRBsXpSczHuel - -481) * 256) + -5658) - 85))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: powershell.exe, 00000000.00000002.2262639105.0000000005196000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: FawqemuyBmsawwOHZu
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $keEoMANEKklErqkS = ((($vqIPLFNhrODYOdbmYl - (((((((128 + -900) + $YjwYiuvYpNuZt) - (((((($oeDgCMrdUrTnYrZ * 16457) - $BpmVieflXB) + 166863) + $aAgxKPHokoeshJGNDq) * $lxbwosjsc))) - 440026)) + (((($vqIPLFNhrODYOdbmYl * 31) + 9898) * $QzFGrXKuVgcPFQV) + $FawqemuyBmsawwOHZu)))) * ((((($OSmhCCiVVcvaoDlx * -9) - (((((($LEmnzzpePRBsXpSczHuel - 3876) + $QUsnODxygywaKYx) + $BhnfWCjCT) + 8) * $zppOCxempWOc)))) + (($pZunsUehIG * -7) - 7505)))) + (((((((8 - (((($nThZRFHczodCQIjn * $WjSVLmvOVInmUrVgua) + $eaEMrGlxnEWQmjDHR) * $aUvphQevd))) * $eSGXcVDTWCrHpHdd) - $dooTFEceTgfjImnXl) - 3164)) - (((8685 - -772162) - $YTANJGNkttH) - $eSGXcVDTWCrHpHdd))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $nThZRFHczodCQIjn = (((((59153 - $zppOCxempWOc) + $OSmhCCiVVcvaoDlx) + $QUsnODxygywaKYx) - ((((($FawqemuyBmsawwOHZu - 2630) + $HjkAVKEKmaLVbtBcFT)) * ((($ukDbGXPMFWbsRJLfkfBGE - 65945) * $LEmnzzpePRBsXpSczHuel) + -821524)))) * 649809)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $AAhEbgCCcmlT = (((((1 + $KTYbPJqBBiAcptx) * (((((((($lxbwosjsc - $feiJBcWxyNQPnmQF) - 70863) + -42) * $pZTjfifajVwieNsXpLR) * ((((($isXPtwPNlizAuJTRNJSR - 893) - 48824) - -653307) - $feiJBcWxyNQPnmQF)))) - ((($OSmhCCiVVcvaoDlx + $zeQQRcnYfkaLCv) * 2) * $FawqemuyBmsawwOHZu)))) + -8) - $WjSVLmvOVInmUrVgua) + ((((((-80505 * (((3908 - 4) + 385))) - (((-3621 + $aAgxKPHokoeshJGNDq) + $HjkAVKEKmaLVbtBcFT))) * $OSmhCCiVVcvaoDlx) + (((($LEcjISrNC * $SNDYinOatvVRp) - $QUsnODxygywaKYx) * $vqIPLFNhrODYOdbmYl))) + -73)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $YjwYiuvYpNuZt = (((($keEoMANEKklErqkS - $SNDYinOatvVRp) * $FawqemuyBmsawwOHZu) - $WOwGSKBvgxtdHIYcrZdL) + (((((($bvNcHjfwFu - 5774) - $aUvphQevd) * ((((($aUvphQevd - 48) + $QzFGrXKuVgcPFQV) * $jRiEEMSDahtDXRX) * 2)))) + ((((((54 * (((($KnBvQNIHSMXTUJskYJcnB * -18377) + $DDnVDvxasyZGaH) * 3))) - -2) * ((((-2928 + 926) - $xJgLSmCGExgpDeuwGs) * 999))) + $pZTjfifajVwieNsXpLR)) * (((51606 + -86439) - 40937) * $clxPhsvxCmfLqRq)))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $cvZBawIacuX = ((((-698521 - 302) + -5208) + $tFbknODqZPoYEsW) * $FawqemuyBmsawwOHZu)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $YjwYiuvYpNuZt = ((-290 + $xAuYKQHHwEukuiZWRKEXE) + ((((((8918 - (((($BDXwthxItR * 189206) - (((96 - 17) + $ljKWwLiwvNQFdMQABBdY))) + $zeQQRcnYfkaLCv))) + 66564) * ((($zeQQRcnYfkaLCv + ((((-6 + $FetNiyptiqwiiSW) + $KnBvQNIHSMXTUJskYJcnB) - $nBYzxRGjtDuHYTVdJVVxn))) - $aUvphQevd)))) + (((((6325 - $HwezPbTrqRzEPpxUzbr) * (((((($HjkAVKEKmaLVbtBcFT * $eaEMrGlxnEWQmjDHR) * 474) - $xJgLSmCGExgpDeuwGs) - -6) + -79))) + ((((($ccHRSZAjBHKVLIoy * 45346) - $YTANJGNkttH) + $isXPtwPNlizAuJTRNJSR) + $pZunsUehIG))) - ((((((-908 + 4961) + -2196) + -77) - $HwezPbTrqRzEPpxUzbr) + $FawqemuyBmsawwOHZu))) - 52670))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (($jRiEEMSDahtDXRX - (((((($yycCLpGMIMmv + $aAgxKPHokoeshJGNDq) + $AAhEbgCCcmlT) * $HjkAVKEKmaLVbtBcFT)) + (((-4 + $dooTFEceTgfjImnXl) + -505) + $BpmVieflXB)))) + $eaEMrGlxnEWQmjDHR)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((-114 -eq $FawqemuyBmsawwOHZu) -and (570531 -ne $ljKWwLiwvNQFdMQABBdY) -and (-94 -ge $OkhFnQfPd)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $QLizooERIru = (((($ukDbGXPMFWbsRJLfkfBGE * $BhnfWCjCT) + -689)) * ((((((8 + ((((-4336 - (((($OSmhCCiVVcvaoDlx - $BkyEihFJBoLlc) + -96637) + -15141))) - ((($LEcjISrNC - $BkyEihFJBoLlc) + 86))) * (((($BhnfWCjCT + 846) + $OSmhCCiVVcvaoDlx) - -620))))) - (((((-225 - $lxbwosjsc) + $BkyEihFJBoLlc)) + ((((($bvNcHjfwFu + 60) - $VkqtaafnKLPLPjl) + $zeQQRcnYfkaLCv) - $KTYbPJqBBiAcptx) * $FawqemuyBmsawwOHZu)))) * -390) * (((((((-459165 + $aAgxKPHokoeshJGNDq) * $isXPtwPNlizAuJTRNJSR) + -99) * (((($BDXwthxItR - -677038) + -363538) - $aUvphQevd)))) + ((((($vqIPLFNhrODYOdbmYl - $bvNcHjfwFu) + $YTANJGNkttH) - $DDnVDvxasyZGaH) + -3627) + $VkqtaafnKLPLPjl))))) * (($ukDbGXPMFWbsRJLfkfBGE * $VkqtaafnKLPLPjl) * (((((($ejrThZkPCAQIEm + $ukDbGXPMFWbsRJLfkfBGE) + $FetNiyptiqwiiSW) * 96353) + 3594) + 87)))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $viDEAeFhykOSE = ((($aUvphQevd * $AAhEbgCCcmlT) + -63235) - $FawqemuyBmsawwOHZu)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (((((-139 - $BhnfWCjCT) - -7147) * $xJgLSmCGExgpDeuwGs)) + ((((($BDXwthxItR * -2462) + (((((($isXPtwPNlizAuJTRNJSR * $FetNiyptiqwiiSW) - 1911) - -3) - $FawqemuyBmsawwOHZu) - $OSmhCCiVVcvaoDlx))) - ((((-168484 * 6674) - $LEcjISrNC) * $KnBvQNIHSMXTUJskYJcnB))) * -301) - ((((($isXPtwPNlizAuJTRNJSR + $LEcjISrNC) - $VnIeYxcKsDXfxF) + -54840) - 99))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $aUvphQevd = (((($bvNcHjfwFu + ((((((4 + $WOwGSKBvgxtdHIYcrZdL) + $FawqemuyBmsawwOHZu) - -6) + -300084) + $YTANJGNkttH))) + 241)) + ((($KnBvQNIHSMXTUJskYJcnB + $VkqtaafnKLPLPjl) * $keEoMANEKklErqkS) * 27))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = ((((3093 - -879506) * $bvNcHjfwFu)) * (((((890 - 81) * ((((128 + 79) - (((((7649 - 34060) * $bvNcHjfwFu) + -388714) * 6231))) - $SNDYinOatvVRp))) - 0) * 92) - $ejrThZkPCAQIEm))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $LEcjISrNC = ((((($BpmVieflXB - ((((0 + (((1109 + -10838) - $TBgUhpZAusN))) * 62) - -768444))) * $FawqemuyBmsawwOHZu) * $lQdSfJKZnepxf)) - (((($oeDgCMrdUrTnYrZ + ((((($ukDbGXPMFWbsRJLfkfBGE * $HPAUgfqkInsquNcv) - 8420) + $QLizooERIru) + (((988 - $cvZBawIacuX) + -131918))))) * (((((($EOCjqUiFVdupblu * (((((($keEoMANEKklErqkS + $gsRwOcOmjjUpCXTcsHn) - 1930) * $coHFkxmaSTBQmOca) + $miiwIudSbQSnYRd) - $ejrThZkPCAQIEm))) - 5546) * ((($HjkAVKEKmaLVbtBcFT + $feiJBcWxyNQPnmQF) * $coHFkxmaSTBQmOca))) + (((((($gsRwOcOmjjUpCXTcsHn + -2199) * $pMVAdIQLxexWYTiOxYHwd) - -28215) + 1353) * -218))) * 55963))) * -736) * $HjkAVKEKmaLVbtBcFT))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $nThZRFHczodCQIjn = (((((220 - ((((((-94356 * -5719) * $BDXwthxItR) + ((((((829369 - $FawqemuyBmsawwOHZu) - 5) - $isXPtwPNlizAuJTRNJSR) * $zppOCxempWOc) - $QLizooERIru)))) * (($QLizooERIru - $pZTjfifajVwieNsXpLR) * -7007)))) * $pZunsUehIG) + -6)) * (((($feiJBcWxyNQPnmQF - $nThZRFHczodCQIjn) - 7363) * $BhnfWCjCT) * $tGRbbBukDU))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (((((-6293 - -7303) * $vqIPLFNhrODYOdbmYl) - ((((($FetNiyptiqwiiSW * 881) + $uZjFCHCuwgMRmVuD)) * ((((((($KnBvQNIHSMXTUJskYJcnB - 40) - ((((((-94 - $FawqemuyBmsawwOHZu) * -52) * $BkyEihFJBoLlc) * 67445) - $zeQQRcnYfkaLCv))) - ((((($BhnfWCjCT * -44369) * -9194) * -273) * 80961))) - $isXPtwPNlizAuJTRNJSR) * ((($KnBvQNIHSMXTUJskYJcnB * $DDnVDvxasyZGaH) - $BhnfWCjCT)))) - (($BDXwthxItR - 371863) - $WjSVLmvOVInmUrVgua)))))) * ((((((($YTANJGNkttH - 915) + ((((85100 * -6) + -35842) + -4160))) + $SNDYinOatvVRp) - 6) + $KnBvQNIHSMXTUJskYJcnB)) + ((53137 * -45909) + $xJgLSmCGExgpDeuwGs)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $KnBvQNIHSMXTUJskYJcnB = ((((($BkyEihFJBoLlc + (((($bvNcHjfwFu * $nBYzxRGjtDuHYTVdJVVxn) + $nBYzxRGjtDuHYTVdJVVxn) * -7065))) * $QLizooERIru) - -351)) - (((($YTANJGNkttH - 772) + -51925) + $FawqemuyBmsawwOHZu) + -87))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $ljKWwLiwvNQFdMQABBdY = ((((($FawqemuyBmsawwOHZu + (((($HPAUgfqkInsquNcv - ((((($ljKWwLiwvNQFdMQABBdY * (((($ukDbGXPMFWbsRJLfkfBGE + $BpmVieflXB) - -8251) * -2))) + -514) + $WOwGSKBvgxtdHIYcrZdL) - 6))) * -51415) + 631))) * (((-6 + $aUvphQevd) - $jRiEEMSDahtDXRX))) + $FetNiyptiqwiiSW) - ((((((((-135 - -131203) - $aUvphQevd) * $SNDYinOatvVRp) * $zppOCxempWOc) + $FawqemuyBmsawwOHZu)) - ((((((-78998 * $BhnfWCjCT) + 250) + $gwepfEVRJEIYqR) + (((($gwepfEVRJEIYqR - $ccHRSZAjBHKVLIoy) + $FawqemuyBmsawwOHZu) * 762)))) + ((-1313 - $aAgxKPHokoeshJGNDq) * 50))))) + 6)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $VnIeYxcKsDXfxF = (((((($YTANJGNkttH * (((((((62184 * $vcorqjBuSFOtoNbA) + -5769) * $aUvphQevd) - -35442)) * ((((($ljKWwLiwvNQFdMQABBdY + $FawqemuyBmsawwOHZu) * $zppOCxempWOc) + $zppOCxempWOc) * ((($QLizooERIru + $gwepfEVRJEIYqR) * 100997))) - $LEmnzzpePRBsXpSczHuel)))) * $tFbknODqZPoYEsW) + ((($SNDYinOatvVRp - $QzFGrXKuVgcPFQV) - 137854))) * (((-978303 - $LEcjISrNC) - $QzFGrXKuVgcPFQV)))) + (((($HjkAVKEKmaLVbtBcFT - $zeQQRcnYfkaLCv) - (((((((44306 + ((((((-276509 - $QLizooERIru) + -42003) + $isXPtwPNlizAuJTRNJSR) * $zYPpmoxLomkKZJtCicT) + $lxbwosjsc))) * $WOwGSKBvgxtdHIYcrZdL) + 82090) * 2348)) - ((39 + $zeQQRcnYfkaLCv) * $xVAhdipiHTyyKaaPS))))) * ((($ccHRSZAjBHKVLIoy * (((((26 * $feiJBcWxyNQPnmQF) - $zYPpmoxLomkKZJtCicT) - -22) * $BpmVieflXB))) + $BhnfWCjCT) - 9)))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $gwepfEVRJEIYqR = ((((9513 + (((($tGRbbBukDU - ((((655 + -26) + $nBYzxRGjtDuHYTVdJVVxn) + $gwepfEVRJEIYqR))) + 66060) * -324668))) - $BhnfWCjCT) + $xJgLSmCGExgpDeuwGs) + ((((((((6 + (((-92114 + $FawqemuyBmsawwOHZu) + 912855))) + -53) * 6922) - $LEcjISrNC) + -303)) - ((((((-6 + ((((((975875 + $KTYbPJqBBiAcptx) * $SNDYinOatvVRp) * -313447) * $HPAUgfqkInsquNcv) - $nThZRFHczodCQIjn))) - $HPAUgfqkInsquNcv) * ((((($KTYbPJqBBiAcptx - 10) + -44) + -903585) - $BkyEihFJBoLlc))) * ((($eaEMrGlxnEWQmjDHR - $FawqemuyBmsawwOHZu) - $bvNcHjfwFu)))) * (($aAgxKPHokoeshJGNDq - $zeQQRcnYfkaLCv) + $BhnfWCjCT)))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($FawqemuyBmsawwOHZu -le -774972) -and (-7 -lt 4)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $WjSVLmvOVInmUrVgua = (((1084 + $FawqemuyBmsawwOHZu) - 97) + 3)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $QzFGrXKuVgcPFQV = (((((($FetNiyptiqwiiSW + $xVAhdipiHTyyKaaPS) * -6) - $vcorqjBuSFOtoNbA) * ((((($aUvphQevd * 40307) - $HwezPbTrqRzEPpxUzbr)) - ((($YTANJGNkttH + $HjkAVKEKmaLVbtBcFT) * 69760) * 975))))) - (((($ljKWwLiwvNQFdMQABBdY - $feiJBcWxyNQPnmQF) + (((((($ljKWwLiwvNQFdMQABBdY * $xVAhdipiHTyyKaaPS) + -6516) + -32) - -977) - $FawqemuyBmsawwOHZu))) + ((((($oeDgCMrdUrTnYrZ * 6845) - -35280) * 53) + -17))) - $bvNcHjfwFu))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $aUvphQevd = (((((($xJgLSmCGExgpDeuwGs + 76) * $tGRbbBukDU) + $FawqemuyBmsawwOHZu) + 47)) - ((((-1277 + -61) - $KnBvQNIHSMXTUJskYJcnB) + $VkqtaafnKLPLPjl) * -546588))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $miiwIudSbQSnYRd = ((((((-395 * ((($WOwGSKBvgxtdHIYcrZdL + ((((208775 + $ukDbGXPMFWbsRJLfkfBGE) * -944) - $uZjFCHCuwgMRmVuD))) + ((((((-4 * 2) * $FawqemuyBmsawwOHZu) + 277) + -1851) - $BLaMzSdCgCFjPG))))) - (((-432 * 32) + (((((($ukDbGXPMFWbsRJLfkfBGE - -364259) + -294) * -9) - 1220) * -448015))))) * (((($DDnVDvxasyZGaH - $qLjXIPrdEbvgJxTh) * -8990) * $FawqemuyBmsawwOHZu))) * $isXPtwPNlizAuJTRNJSR)) * (($ccHRSZAjBHKVLIoy - 0) - -9))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $SNDYinOatvVRp = (((((((136459 - (((($BhnfWCjCT - 1) - 93) - $LEcjISrNC))) + 794) - (((($FawqemuyBmsawwOHZu * 6) - 999814) - $ccHRSZAjBHKVLIoy))) - 364) * -14409)) + (((((-86 * $keEoMANEKklErqkS) * -8) * $pZTjfifajVwieNsXpLR) * $DDnVDvxasyZGaH) + 73470))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eSGXcVDTWCrHpHdd = (((((((-844039 + ((((($WOwGSKBvgxtdHIYcrZdL - $cvZBawIacuX) + $viDEAeFhykOSE) - $FnbHLOgPym) - -311048))) + 27) + ((((((($pZunsUehIG * -575514) - 96462) + 74000) * $nBYzxRGjtDuHYTVdJVVxn)) * (((((7108 + $BkyEihFJBoLlc) + $zeQQRcnYfkaLCv) * -72995) - $FawqemuyBmsawwOHZu) - -32405)))) * -38) - -77852)) * (((($tGRbbBukDU * $zYPpmoxLomkKZJtCicT) - ((($gwepfEVRJEIYqR * 171000) * 853))) + 94) + (((($zYPpmoxLomkKZJtCicT + $gwepfEVRJEIYqR) * $pZunsUehIG) + $viDEAeFhykOSE))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $nBYzxRGjtDuHYTVdJVVxn = ((($BkyEihFJBoLlc + 9) - ((((((((94 - (((((-88 + -6441) + ((((((525 + $aUvphQevd) * $VnIeYxcKsDXfxF) + -3734) + $YTANJGNkttH) * -469))) + 22) * -7))) * $WOwGSKBvgxtdHIYcrZdL) * $xJgLSmCGExgpDeuwGs) + $SNDYinOatvVRp) - -2812)) - ((((($YTANJGNkttH + -903) + $FawqemuyBmsawwOHZu) * (((-2075 * $uZjFCHCuwgMRmVuD) * $FetNiyptiqwiiSW)))) - ((($uZjFCHCuwgMRmVuD - $isXPtwPNlizAuJTRNJSR) * $tGRbbBukDU) * -1))))) + $WjSVLmvOVInmUrVgua)
                      Source: svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((-309117 -ge $FawqemuyBmsawwOHZu) -or ($BkyEihFJBoLlc -eq $SNDYinOatvVRp) -or ($yycCLpGMIMmv -gt 49802) -or ($FetNiyptiqwiiSW -le 9722)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $BhnfWCjCT = ((((($WjSVLmvOVInmUrVgua + $FawqemuyBmsawwOHZu) + $FawqemuyBmsawwOHZu) * $xJgLSmCGExgpDeuwGs)) - ((((-678669 - 95) * ((((($DDnVDvxasyZGaH - -7) - ((((((4746 - 38724) * $zeQQRcnYfkaLCv) + $WjSVLmvOVInmUrVgua) * $WjSVLmvOVInmUrVgua) * $KnBvQNIHSMXTUJskYJcnB))) - -3) - (((-7 * $bvNcHjfwFu) + $ukDbGXPMFWbsRJLfkfBGE)))))) * ((((((-8 + (((($VkqtaafnKLPLPjl + $KnBvQNIHSMXTUJskYJcnB) + $WjSVLmvOVInmUrVgua) - $VnIeYxcKsDXfxF))) + (((-300675 * 53) - $WjSVLmvOVInmUrVgua))) * $VnIeYxcKsDXfxF) + ((($BDXwthxItR - $LEcjISrNC) + 33608)))) * ((($VkqtaafnKLPLPjl - $FetNiyptiqwiiSW) * $FawqemuyBmsawwOHZu) * -89))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $SNDYinOatvVRp = ((((((-69802 - 2) * $WOwGSKBvgxtdHIYcrZdL) + (((((($feiJBcWxyNQPnmQF * 15505) - 5079) + $zeQQRcnYfkaLCv) + $aUvphQevd) + (((((($BDXwthxItR * (((-55538 + $WjSVLmvOVInmUrVgua) + $FawqemuyBmsawwOHZu))) + ((((5 + $xJgLSmCGExgpDeuwGs) * $ejrThZkPCAQIEm) + 62922))) * ((((503 * 48) * 32360) + 56026)))) - (($BkyEihFJBoLlc - 625) + 1)))))) * -36)) - (((((5 * 5) * $ukDbGXPMFWbsRJLfkfBGE) * (((((-13831 * -58) + (((($xJgLSmCGExgpDeuwGs * 4256) - $ukDbGXPMFWbsRJLfkfBGE) * 454)))) - (((-543284 - $DDnVDvxasyZGaH) - $SNDYinOatvVRp) - $ejrThZkPCAQIEm)))) + 55) - $ejrThZkPCAQIEm))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $BkyEihFJBoLlc = (((((-3 * $feiJBcWxyNQPnmQF) * $WjSVLmvOVInmUrVgua) * $vqIPLFNhrODYOdbmYl) - -8269) * (((($HwezPbTrqRzEPpxUzbr + ((((((78035 * ((((($WiXVRGlNgyS + 6) * -7) - $FawqemuyBmsawwOHZu) - $pZTjfifajVwieNsXpLR))) * ((((-227 - 0) - $zeQQRcnYfkaLCv) * $ljKWwLiwvNQFdMQABBdY))) - ((($zeQQRcnYfkaLCv * $VkqtaafnKLPLPjl) + 23292))) - -2) - -6299))) * $ljKWwLiwvNQFdMQABBdY) + $OSmhCCiVVcvaoDlx)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $HwezPbTrqRzEPpxUzbr = ((((($uZjFCHCuwgMRmVuD - (((((((($YjwYiuvYpNuZt + $yycCLpGMIMmv) - $SDnIVLdAPekHPz) * $BpmVieflXB) * $tGRbbBukDU) * ((((46932 + $VnIeYxcKsDXfxF) - -4) * ((($uZjFCHCuwgMRmVuD - 14905) - $jRiEEMSDahtDXRX)))))) * ((((((-994 - -19) + (((((86 + -6) + 8) * -47272) * -65176))) - $WjSVLmvOVInmUrVgua) + (((1597 + $gsRwOcOmjjUpCXTcsHn) * $KTYbPJqBBiAcptx)))) * (($SNDYinOatvVRp - 7241) - $yycCLpGMIMmv))))) - -619299) - $FawqemuyBmsawwOHZu)) - (((((917 * -91377) - $xVAhdipiHTyyKaaPS) * -58160) * -5) + $BhnfWCjCT))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $VkqtaafnKLPLPjl = (($BhnfWCjCT * ((((((($VkqtaafnKLPLPjl * $isXPtwPNlizAuJTRNJSR) + ((((((-21 * $uZjFCHCuwgMRmVuD) * $WOwGSKBvgxtdHIYcrZdL) * (((-398166 * $aUvphQevd) - -6588)))) - ((-52 + $FawqemuyBmsawwOHZu) - 18)))) + ((((((722047 - -5) * $FetNiyptiqwiiSW) * ((((-407222 * -8819) * 0) - $VnIeYxcKsDXfxF))) - 65) - 198480))) + ((((($vqIPLFNhrODYOdbmYl * ((((8620 - 46859) * $xJgLSmCGExgpDeuwGs) + 1211))) - -72713) - $ukDbGXPMFWbsRJLfkfBGE) - -3)))) - (((($SNDYinOatvVRp + 413) + $FetNiyptiqwiiSW)) + (((892 - $DDnVDvxasyZGaH) + $BhnfWCjCT) * $vqIPLFNhrODYOdbmYl))))) + $BhnfWCjCT)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $QzFGrXKuVgcPFQV = ((((48440 * 157) * $BDXwthxItR) - ((($oeDgCMrdUrTnYrZ * ((((($aAgxKPHokoeshJGNDq * $KTYbPJqBBiAcptx) * $pZunsUehIG) * -341966) - $pZunsUehIG))) - $FawqemuyBmsawwOHZu))) - $WjSVLmvOVInmUrVgua)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $UFxRFzGIi = (((-49 - ((((($oeDgCMrdUrTnYrZ * ((((((4 - $WiXVRGlNgyS) - -55095) * 15) * $miiwIudSbQSnYRd) * 6171))) - ((((((((-200 - 83) - ((($miiwIudSbQSnYRd * $TBgUhpZAusN) * $lNcsnUoYskCNfoHfdVnzd))) + 1900) - 37) + -60872)) * (($MuNChZebK - $FawqemuyBmsawwOHZu) - $eaEMrGlxnEWQmjDHR)))) * -116024) + $bABhRHoDjnMXwTzxW))) + $MuNChZebK) + 721)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $ukDbGXPMFWbsRJLfkfBGE = ((($FawqemuyBmsawwOHZu * 6) + (((((201 - -57) * $VkqtaafnKLPLPjl) * -6) - $BhnfWCjCT))) - $VnIeYxcKsDXfxF)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((197 -ge 55619) -or ($FawqemuyBmsawwOHZu -gt 17) -or (-20 -eq 248) -or (-9658 -ge -8855)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $SZzxWNxjTVCtBKLGZMHP = (((((($dooTFEceTgfjImnXl * 1) - $dooTFEceTgfjImnXl) + 26) + $KnBvQNIHSMXTUJskYJcnB)) * ((((307229 + 787980) - $FawqemuyBmsawwOHZu) * $ljKWwLiwvNQFdMQABBdY) * $SZzxWNxjTVCtBKLGZMHP))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (($MuNChZebK * $lQdSfJKZnepxf) * $YTANJGNkttH)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((-56656 -le $FawqemuyBmsawwOHZu) -and ($KnBvQNIHSMXTUJskYJcnB -ne $DDnVDvxasyZGaH) -and (-1 -gt -46)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $ccHRSZAjBHKVLIoy = ((((($MuNChZebK * ((((($jRiEEMSDahtDXRX * $pMVAdIQLxexWYTiOxYHwd) + $vqIPLFNhrODYOdbmYl) - 4398) + $QUsnODxygywaKYx))) - ((((((798 + 7788) - $gsRwOcOmjjUpCXTcsHn) - $BDXwthxItR)) * (((((79331 - $dooTFEceTgfjImnXl) + $tGRbbBukDU) + $nThZRFHczodCQIjn) + $HjkAVKEKmaLVbtBcFT) * 39919)))) - $FawqemuyBmsawwOHZu)) - ((((((($nThZRFHczodCQIjn * 5453) + 802) - $pZunsUehIG) - -266) + $keEoMANEKklErqkS)) + (((((-5389 * -2) - $YjwYiuvYpNuZt) * $UFxRFzGIi) * -319) + $FnbHLOgPym)))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $gsRwOcOmjjUpCXTcsHn = (((((($oeDgCMrdUrTnYrZ + 235553) + ((((((((3222 - ((((((((-94 - -6405) - $gsRwOcOmjjUpCXTcsHn) - 16841) * (((((($nThZRFHczodCQIjn + 93) + -614796) - $vqIPLFNhrODYOdbmYl) * $SNDYinOatvVRp) - 74444))) - $zppOCxempWOc)) * ((63597 * $FawqemuyBmsawwOHZu) + $xJgLSmCGExgpDeuwGs)))) - $BDXwthxItR) + $HjkAVKEKmaLVbtBcFT) - 569972) + 89128)) - ((((-7 - 60480) * $xJgLSmCGExgpDeuwGs) * ((((((40659 * $AAhEbgCCcmlT) * $AAhEbgCCcmlT) + $QLizooERIru) - $QUsnODxygywaKYx) - -373967))) - 39)))) + $SNDYinOatvVRp) - $BDXwthxItR)) - (((($aAgxKPHokoeshJGNDq * (((((($LEcjISrNC - $keEoMANEKklErqkS) + ((($BkyEihFJBoLlc + $YjwYiuvYpNuZt) + 1392))) - (((((-580 - -206) - $KnBvQNIHSMXTUJskYJcnB) + $feiJBcWxyNQPnmQF) + -540)))) - ((-93 - $tGRbbBukDU) - $LEmnzzpePRBsXpSczHuel)))) * 0) - $keEoMANEKklErqkS) - -8104))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($nBYzxRGjtDuHYTVdJVVxn -le -9) -or (-6903 -lt 6) -or ($FawqemuyBmsawwOHZu -eq 6)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((-3 -le $FawqemuyBmsawwOHZu) -and ($dooTFEceTgfjImnXl -eq $BpmVieflXB)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $isXPtwPNlizAuJTRNJSR = (((((-54567 - -201) * $KnBvQNIHSMXTUJskYJcnB) - 2) * (((((($aUvphQevd * (((((($isXPtwPNlizAuJTRNJSR * (((((($LEmnzzpePRBsXpSczHuel * 9922) - $uZjFCHCuwgMRmVuD) * $ejrThZkPCAQIEm) * -43917) - -620211))) + $HwezPbTrqRzEPpxUzbr) + -948)) + ((((($pZTjfifajVwieNsXpLR - $KnBvQNIHSMXTUJskYJcnB) + $QUsnODxygywaKYx) * 7) + $ejrThZkPCAQIEm) - $WjSVLmvOVInmUrVgua)))) - (((((($ccHRSZAjBHKVLIoy * $SNDYinOatvVRp) * ((((-16 + $VnIeYxcKsDXfxF) * 888) * 484968))) * ((((($BkyEihFJBoLlc * $FawqemuyBmsawwOHZu) * $zppOCxempWOc) + $KTYbPJqBBiAcptx) * $KnBvQNIHSMXTUJskYJcnB))) * 4) - $KnBvQNIHSMXTUJskYJcnB))) + $nBYzxRGjtDuHYTVdJVVxn) - -86970) - -85))) * $ukDbGXPMFWbsRJLfkfBGE)
                      Source: svchost.exe, 0000000F.00000002.2333325934.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2751234464.000001A7A522F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2751171982.000001A7A5213000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $LEcjISrNC = (($xAuYKQHHwEukuiZWRKEXE * $FawqemuyBmsawwOHZu) - (((($LEcjISrNC + $QUsnODxygywaKYx) * -37061) + 5)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($YZiyXAgPVGzsLWNvRydn -gt 748) -and (-9 -le 257289) -and (-4987 -ne 49607) -and ($tGRbbBukDU -le $FawqemuyBmsawwOHZu)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $AAhEbgCCcmlT = (((((($QLizooERIru * -3879) * -985108) - (((((($BDXwthxItR - $BDXwthxItR) * 15) * -4) - (((((18 * -5600) + $FetNiyptiqwiiSW) + 73) - 9660))) * $feiJBcWxyNQPnmQF))) * 668121)) * ((((((($YTANJGNkttH * (((($KTYbPJqBBiAcptx * 8352) * -932) + $ccHRSZAjBHKVLIoy))) - $tGRbbBukDU) + -60117) * $FawqemuyBmsawwOHZu) + $nBYzxRGjtDuHYTVdJVVxn)) - ((((($FetNiyptiqwiiSW * -55) + 3853) + $HjkAVKEKmaLVbtBcFT) - 693622) - $BhnfWCjCT)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($WiXVRGlNgyS -eq 260) -and ($zeQQRcnYfkaLCv -eq $AAhEbgCCcmlT) -and ($AAhEbgCCcmlT -eq $FawqemuyBmsawwOHZu)) {
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($BhnfWCjCT -lt -56962) -and (-9894 -eq 89) -and (645 -lt 353053) -and ($FawqemuyBmsawwOHZu -ne $BkyEihFJBoLlc)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $DDnVDvxasyZGaH = (($isXPtwPNlizAuJTRNJSR + $SNDYinOatvVRp) + $FawqemuyBmsawwOHZu)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((7 -gt $FawqemuyBmsawwOHZu) -or ($DwXHSGGMiILc -lt $VnIeYxcKsDXfxF)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $BDXwthxItR = ((($KnBvQNIHSMXTUJskYJcnB - ((((-9656 * $WOwGSKBvgxtdHIYcrZdL) + -50) - $YTANJGNkttH))) - ((((-35516 * -107) + -195) * $FawqemuyBmsawwOHZu))) - $xJgLSmCGExgpDeuwGs)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $aAgxKPHokoeshJGNDq = (((($ukDbGXPMFWbsRJLfkfBGE - $VkqtaafnKLPLPjl) + $uZjFCHCuwgMRmVuD) + (((((($SNDYinOatvVRp * $FawqemuyBmsawwOHZu) + -2) * 96) - 4528) - -13272))) + -93)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((-7 -ge 8056) -and (48649 -le $ejrThZkPCAQIEm) -and ($isXPtwPNlizAuJTRNJSR -gt $FawqemuyBmsawwOHZu)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((1458 -gt $BDXwthxItR) -or (-666 -eq $xJgLSmCGExgpDeuwGs) -or ($FawqemuyBmsawwOHZu -gt 22675)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($FawqemuyBmsawwOHZu -ne $aUvphQevd) -and ($bvNcHjfwFu -ge $BhnfWCjCT) -and ($QUsnODxygywaKYx -ge 46405) -and ($HPAUgfqkInsquNcv -ge -34)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = (((($BDXwthxItR - ((($xJgLSmCGExgpDeuwGs + $OSmhCCiVVcvaoDlx) - $OSmhCCiVVcvaoDlx))) + 8482)) * ((($vqIPLFNhrODYOdbmYl - $LEcjISrNC) - 896) * -4842))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if ((7436 -gt 1583) -and (-202 -le $KTYbPJqBBiAcptx) -and ($ccHRSZAjBHKVLIoy -gt $LEcjISrNC) -and ($FawqemuyBmsawwOHZu -ge $aAgxKPHokoeshJGNDq)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $WiXVRGlNgyS = (((((-394 - ((((60 * $keEoMANEKklErqkS) * -4596) + 67319))) - (((($ccHRSZAjBHKVLIoy * -313948) * $HjkAVKEKmaLVbtBcFT) + -8604))) - (((($feiJBcWxyNQPnmQF - -676994) * $zeQQRcnYfkaLCv) * $xJgLSmCGExgpDeuwGs))) * $zeQQRcnYfkaLCv) - $FawqemuyBmsawwOHZu)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $bvNcHjfwFu = (((((39611 + -699) - (((2 + $ukDbGXPMFWbsRJLfkfBGE) * 22))) * -7)) * (((((-3853 * $FawqemuyBmsawwOHZu) * 113) + 159411) + $ukDbGXPMFWbsRJLfkfBGE) * 0))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $xVAhdipiHTyyKaaPS = (((($DDnVDvxasyZGaH + $FawqemuyBmsawwOHZu) - $HjkAVKEKmaLVbtBcFT) + $ccHRSZAjBHKVLIoy) + 45)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eaEMrGlxnEWQmjDHR = ((($bABhRHoDjnMXwTzxW * 617387) - (((((-450002 - ((($WjSVLmvOVInmUrVgua * -430396) * -163))) - -893) - (((76473 + $HwezPbTrqRzEPpxUzbr) + $FawqemuyBmsawwOHZu))) - $YTANJGNkttH))) + (((((($lxbwosjsc + $eaEMrGlxnEWQmjDHR) * 41840) * (((-5522 - $LEcjISrNC) - 8962))) - -886) * $pZunsUehIG)))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $TBgUhpZAusN = (((((75 * ((((($YjwYiuvYpNuZt + ((((($SDnIVLdAPekHPz * -123) - (((($BpmVieflXB * -767231) - 45641) - 845)))) * ((($FawqemuyBmsawwOHZu * -320) + $YTANJGNkttH) - $zYPpmoxLomkKZJtCicT)))) * 86176) - ((((($VnIeYxcKsDXfxF - -84) + 3877)) - (($VnIeYxcKsDXfxF * $BDXwthxItR) * -244468)))) * ((($lxbwosjsc * ((((($FawqemuyBmsawwOHZu - $zeQQRcnYfkaLCv) - 44) * 692) * $SDnIVLdAPekHPz))) + $KnBvQNIHSMXTUJskYJcnB))))) - (((2213 + (((((($WjSVLmvOVInmUrVgua - $SDnIVLdAPekHPz) - 46706) - -1) + 40) + -386949))) - -2044))) * 347117) + -96388) * -790)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $BDXwthxItR = ((((((-24 - -2723) - 6) * 38) - ((((2 - $FawqemuyBmsawwOHZu) - $OSmhCCiVVcvaoDlx) - 938842)))) + ((((($xJgLSmCGExgpDeuwGs + $FawqemuyBmsawwOHZu) - -62) - $vqIPLFNhrODYOdbmYl) * $WOwGSKBvgxtdHIYcrZdL) + -45))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $zeQQRcnYfkaLCv = (((((($BLaMzSdCgCFjPG * $VkqtaafnKLPLPjl) - (((((($nThZRFHczodCQIjn - $eSGXcVDTWCrHpHdd) * -67392) + $ccHRSZAjBHKVLIoy)) - ((((-6215 + -990) * 13) * $ccHRSZAjBHKVLIoy) * 838002)))) - ((((($zeQQRcnYfkaLCv * ((((44056 * 85822) + 6) - $gsRwOcOmjjUpCXTcsHn))) + $clxPhsvxCmfLqRq) * -3) + $coHFkxmaSTBQmOca))) * (((((($HjkAVKEKmaLVbtBcFT - ((((214988 * $isXPtwPNlizAuJTRNJSR) + -173) * $tFbknODqZPoYEsW))) - $FawqemuyBmsawwOHZu) * (((($oeDgCMrdUrTnYrZ * 313) * $BhnfWCjCT) - $gsRwOcOmjjUpCXTcsHn)))) + ((-733917 - $ccHRSZAjBHKVLIoy) + $QzFGrXKuVgcPFQV))))) + (((0 - 7) - ((((((-54611 * $jRiEEMSDahtDXRX) + $yycCLpGMIMmv) - $HwezPbTrqRzEPpxUzbr) - $xAuYKQHHwEukuiZWRKEXE) * 94560))) - (((((($isXPtwPNlizAuJTRNJSR + -8) + 5170) * $xAuYKQHHwEukuiZWRKEXE) - $nThZRFHczodCQIjn) + $clxPhsvxCmfLqRq))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = ((((((-558 - 8287) + -72) - 544132) * (((($pMVAdIQLxexWYTiOxYHwd - -2842) + $ccHRSZAjBHKVLIoy) - (((((($VnIeYxcKsDXfxF * -8) - $gsRwOcOmjjUpCXTcsHn) - $wAiTzzhxVrtXKiJXy) * $BLaMzSdCgCFjPG) * -39)))))) * (($BpmVieflXB * 87) - -4))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $feiJBcWxyNQPnmQF = (((((-807 + -40768) * (((-1031 * 9759) * -49))) * ((($DDnVDvxasyZGaH * $xJgLSmCGExgpDeuwGs) + $FawqemuyBmsawwOHZu))) - $YTANJGNkttH) - -9)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $xVAhdipiHTyyKaaPS = ((((-53 + 1829) - 913) * (((((0 * $QUsnODxygywaKYx) - $YTANJGNkttH) - $uZjFCHCuwgMRmVuD) * $FawqemuyBmsawwOHZu))) * (((($HjkAVKEKmaLVbtBcFT * -555) + $zppOCxempWOc) + 5)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $EOCjqUiFVdupblu = ((((($FawqemuyBmsawwOHZu * ((((($YZiyXAgPVGzsLWNvRydn + 39) * $cvZBawIacuX) + -726520) + $HwezPbTrqRzEPpxUzbr))) - ((((3 - $vqIPLFNhrODYOdbmYl) - 1) - $jRiEEMSDahtDXRX))) * $LEmnzzpePRBsXpSczHuel)) - ((((1346 * $feiJBcWxyNQPnmQF) - $MuNChZebK) * $XxlCVKuXJff) * -831))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $aAgxKPHokoeshJGNDq = ((((8317 + (((((((($YTANJGNkttH * $BhnfWCjCT) * $aAgxKPHokoeshJGNDq) + (((($vqIPLFNhrODYOdbmYl - 8) + $keEoMANEKklErqkS) * 4))) + $KnBvQNIHSMXTUJskYJcnB) - -7)) * (((((($bvNcHjfwFu * 391536) - 27) * (((((8728 - -22608) + -54746) + $zeQQRcnYfkaLCv) + $ejrThZkPCAQIEm))) - 924)) - ((($zeQQRcnYfkaLCv * $ukDbGXPMFWbsRJLfkfBGE) + -15002) * $zeQQRcnYfkaLCv))))) * ((((($FawqemuyBmsawwOHZu - (((((((($VnIeYxcKsDXfxF - 100340) + $BkyEihFJBoLlc) - 36) * -89) * $uZjFCHCuwgMRmVuD)) - ((($FetNiyptiqwiiSW * 65324) + $DDnVDvxasyZGaH) * $nBYzxRGjtDuHYTVdJVVxn)))) * -7)) + ((($pZTjfifajVwieNsXpLR + $BkyEihFJBoLlc) * (((18 - $FawqemuyBmsawwOHZu) + -1961))) - -1))))) + (((((((1 * ((((((-8 + ((($DDnVDvxasyZGaH - -394) * 1997))) * (((944876 - 420) + -8))) + 2) + -26904) * 67))) * $nBYzxRGjtDuHYTVdJVVxn) + -73) - -93) * -55)) + ((-69 * 67) - 8)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: if (($FawqemuyBmsawwOHZu -eq 898988) -and ($ejrThZkPCAQIEm -ne -8) -and (-886 -lt -3)) {
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $feiJBcWxyNQPnmQF = ((((((44314 + $DDnVDvxasyZGaH) - (((-27141 - 2) - 2164))) - $SNDYinOatvVRp) + ((((((-938 - $YTANJGNkttH) + $xJgLSmCGExgpDeuwGs) * $SNDYinOatvVRp)) - ((((-206 - $feiJBcWxyNQPnmQF) + 4107) * 6) * $VkqtaafnKLPLPjl))))) + (((((5688 + $FawqemuyBmsawwOHZu) - 2) * $FawqemuyBmsawwOHZu) + 781517) - (((((-89 * 463784) * -98351) * $VkqtaafnKLPLPjl) - 4))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $OSmhCCiVVcvaoDlx = (((((((-1 - (((((926049 * (((((-39280 + $VnIeYxcKsDXfxF) * $FetNiyptiqwiiSW)) - (((((53150 - $FetNiyptiqwiiSW) - 61758) - $LEcjISrNC) * $DDnVDvxasyZGaH) - -357)))) * (((((24293 * ((($KnBvQNIHSMXTUJskYJcnB + 42) * $WOwGSKBvgxtdHIYcrZdL))) - ((((7 + -23972) + 539) - $ukDbGXPMFWbsRJLfkfBGE))) + (((((-8670 - $zeQQRcnYfkaLCv) - -504626) * -4223) * -44198))) + $LEcjISrNC)))) * (((($feiJBcWxyNQPnmQF * $KnBvQNIHSMXTUJskYJcnB) - $BDXwthxItR)) - ((-951780 * $zeQQRcnYfkaLCv) - -3))))) + ((($FawqemuyBmsawwOHZu * 155390) + ((((((($FawqemuyBmsawwOHZu - $YTANJGNkttH) + $isXPtwPNlizAuJTRNJSR) + (((574 - -30526) - $xJgLSmCGExgpDeuwGs))) * -75)) * ((((($isXPtwPNlizAuJTRNJSR * $VkqtaafnKLPLPjl) - -260792) - $isXPtwPNlizAuJTRNJSR) * $BkyEihFJBoLlc) + -22843)))))) - $tGRbbBukDU) - 48) * 2361)) + ((((5 * (((-513050 - $WjSVLmvOVInmUrVgua) + $BkyEihFJBoLlc))) * $OSmhCCiVVcvaoDlx) - 362) * 835140))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $HwezPbTrqRzEPpxUzbr = (((((((443746 * 536) + -761) * (((($MuNChZebK + 7) + 33614) + $uZjFCHCuwgMRmVuD))) + -984) + ((((-7087 - 59) - $LEcjISrNC) * $FawqemuyBmsawwOHZu)))) * (($YZiyXAgPVGzsLWNvRydn * $HPAUgfqkInsquNcv) + $SNDYinOatvVRp))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $uZjFCHCuwgMRmVuD = ((((($zeQQRcnYfkaLCv + (((57 - $feiJBcWxyNQPnmQF) + 0))) * 8) * $FetNiyptiqwiiSW) - 6) + ((((-28608 + $FawqemuyBmsawwOHZu) - $BhnfWCjCT) + $lxbwosjsc)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $wdiOzNWDJbtitMpyhtP = (((((871545 - $TBgUhpZAusN) + (((((-94 * -464) + $pZTjfifajVwieNsXpLR)) + ((((($TBgUhpZAusN + -4) * 185) - $BLaMzSdCgCFjPG) - $zppOCxempWOc) - $jRiEEMSDahtDXRX)))) - $zeQQRcnYfkaLCv)) + ((((((($HPAUgfqkInsquNcv * 2) * ((((2 * -629502) - 1) * $FawqemuyBmsawwOHZu))) + -21) + 99690) + ((((-613 + 61815) - $QLizooERIru) + 90)))) + ((($oeDgCMrdUrTnYrZ + $ljKWwLiwvNQFdMQABBdY) * 75212) * $eaEMrGlxnEWQmjDHR)))
                      Source: svchost.exe, 0000000F.00000002.2333353936.0000000003012000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $FawqemuyBmsawwOHZu = ((((-9 * -404) - $VnIeYxcKsDXfxF) + (((($feiJBcWxyNQPnmQF * $VnIeYxcKsDXfxF) + $xJgLSmCGExgpDeuwGs) * $VkqtaafnKLPLPjl))) - $OSmhCCiVVcvaoDlx)
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $oeDgCMrdUrTnYrZ = ((((((($OSmhCCiVVcvaoDlx - $QUsnODxygywaKYx) + (((-3672 * 434) * 593))) - ((((((-795768 * ((((((2474 + $YTANJGNkttH) - $pZunsUehIG) + ((($tFbknODqZPoYEsW - $vqIPLFNhrODYOdbmYl) - 2112)))) + (((56 - $QLizooERIru) + -34) * $aUvphQevd)))) - (((($aAgxKPHokoeshJGNDq * ((((($FawqemuyBmsawwOHZu + -7) * $jRiEEMSDahtDXRX) + $HjkAVKEKmaLVbtBcFT) + -911))) * $aAgxKPHokoeshJGNDq) * (((((-66 - -6) - $QzFGrXKuVgcPFQV) + $jRiEEMSDahtDXRX) + -1418))))) - $WiXVRGlNgyS) * ((((((-22681 + (((((-3889 * $tFbknODqZPoYEsW) * 0) - $aAgxKPHokoeshJGNDq) + $FetNiyptiqwiiSW))) * $QzFGrXKuVgcPFQV) - -172849) - $BkyEihFJBoLlc) + ((((9 - -369286) + $vcorqjBuSFOtoNbA) - $SNDYinOatvVRp))))) + $SNDYinOatvVRp))) + ((((((($OSmhCCiVVcvaoDlx + 9791) + 27379) * $HjkAVKEKmaLVbtBcFT) * (((((((-57 * $eaEMrGlxnEWQmjDHR) + -2479) * $WjSVLmvOVInmUrVgua) - $ukDbGXPMFWbsRJLfkfBGE)) * ((($isXPtwPNlizAuJTRNJSR * $HPAUgfqkInsquNcv) * $nThZRFHczodCQIjn) * $gwepfEVRJEIYqR))))) - (((((($tFbknODqZPoYEsW * (((((($uZjFCHCuwgMRmVuD - -222) * 595) + 6) * 6196) * -91707))) * 248377) * -807127) + 5)) * ((((($BDXwthxItR - 3290) * -9597) + 446413) - $WOwGSKBvgxtdHIYcrZdL) - $FawqemuyBmsawwOHZu))))) - -6)) - ((((($LEmnzzpePRBsXpSczHuel + $QUsnODxygywaKYx) - 20) * (((8 - ((((($xJgLSmCGExgpDeuwGs * -6976) - 963204) - -22) + 600))) + 35390)))) + (((($zppOCxempWOc - $HPAUgfqkInsquNcv) + ((((((794969 - $VkqtaafnKLPLPjl) * $SNDYinOatvVRp) * $isXPtwPNlizAuJTRNJSR) * -5645) - -99616))) - ((((-6042 - 5342) - 57) + 6692))) + $BpmVieflXB)))
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: svchost.exe, 00000013.00000003.2510909937.000001A7A876E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $ljKWwLiwvNQFdMQABBdY = ((((((-3 * -8) + ((((($DDnVDvxasyZGaH * 226308) * $pZTjfifajVwieNsXpLR) + -8900) * -115))) + -4) + 325681)) + (((((((-247 * $VkqtaafnKLPLPjl) + -44480) - $DDnVDvxasyZGaH) * ((((((((7753 + (((($WOwGSKBvgxtdHIYcrZdL + $WjSVLmvOVInmUrVgua) + 8409) * -563))) - (((((($YTANJGNkttH - $DDnVDvxasyZGaH) + $aUvphQevd) - -148665) * 499) + $isXPtwPNlizAuJTRNJSR))) - $SNDYinOatvVRp) + $ejrThZkPCAQIEm) + $AAhEbgCCcmlT)) * (((((-35676 + -7397) * -111) - $QLizooERIru) - 921) - 477117)))) + (((((((($FawqemuyBmsawwOHZu * $ukDbGXPMFWbsRJLfkfBGE) - ((((((-2222 + $FetNiyptiqwiiSW) - 7) - $KnBvQNIHSMXTUJskYJcnB) - $pZTjfifajVwieNsXpLR) + $LEcjISrNC))) + -361898) - ((((((12 - $eaEMrGlxnEWQmjDHR) - $tGRbbBukDU) + -71474) * $xJgLSmCGExgpDeuwGs) + $LEcjISrNC))) - ((((($FawqemuyBmsawwOHZu * 3) - 14458) - $ljKWwLiwvNQFdMQABBdY) + -99)))) - ((((-452 * 33019) + -923736) * $ccHRSZAjBHKVLIoy) * $WjSVLmvOVInmUrVgua))))) - ((((-2748 + 17) - $WjSVLmvOVInmUrVgua) * -719) * (((97629 * $AAhEbgCCcmlT) - $YTANJGNkttH)))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $zeQQRcnYfkaLCv = ((((((($aUvphQevd * 554) - $ukDbGXPMFWbsRJLfkfBGE) - 972) - (((((($FawqemuyBmsawwOHZu * -969940) * -75) - -97624) - -441832) * 0))) * 37)) + (($KTYbPJqBBiAcptx - -8) * 6))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $gwepfEVRJEIYqR = ((-735 - $vcorqjBuSFOtoNbA) + ((((((-516678 + (((($QzFGrXKuVgcPFQV * $QUsnODxygywaKYx) + $WOwGSKBvgxtdHIYcrZdL) - $pZunsUehIG))) * (((-3 + $tFbknODqZPoYEsW) + -8))) + ((((($vqIPLFNhrODYOdbmYl - $YjwYiuvYpNuZt) + $FawqemuyBmsawwOHZu) + $keEoMANEKklErqkS) + $pZTjfifajVwieNsXpLR)))) + ((((($BDXwthxItR * -923) * -87) - $pZunsUehIG) * 2) * $WOwGSKBvgxtdHIYcrZdL))))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $qLjXIPrdEbvgJxTh = (((((((7 + -119401) - ((((($yycCLpGMIMmv * -27092) * $jRiEEMSDahtDXRX) - 3) * -721))) + 5788) + -6) * -7)) - (((($eaEMrGlxnEWQmjDHR - ((($miiwIudSbQSnYRd * -604356) * $gwepfEVRJEIYqR))) * -38)) - (($QzFGrXKuVgcPFQV - $FawqemuyBmsawwOHZu) - $yycCLpGMIMmv)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $xJgLSmCGExgpDeuwGs = (((((-19394 * (((((($FawqemuyBmsawwOHZu - -93808) - 81) * (((-263 - $HjkAVKEKmaLVbtBcFT) * $zeQQRcnYfkaLCv)))) - (((((52 + 4) * 939776) * 88) - $isXPtwPNlizAuJTRNJSR) * -8)))) + -752343) - $ejrThZkPCAQIEm) * $zeQQRcnYfkaLCv) - 157)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $KTYbPJqBBiAcptx = ((((($zeQQRcnYfkaLCv + ((((-6362 + $FawqemuyBmsawwOHZu) - 53) + 47))) - 2) * ((($feiJBcWxyNQPnmQF + $ukDbGXPMFWbsRJLfkfBGE) + 540)))) * ((-97 + $BhnfWCjCT) + 99949))
                      Source: svchost.exe, 0000000F.00000003.2278158926.0000000005160000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $aAgxKPHokoeshJGNDq = ((((780456 - -477) * ((((($uZjFCHCuwgMRmVuD * $HPAUgfqkInsquNcv) + -349) * $WOwGSKBvgxtdHIYcrZdL) * -51))) + (((((($FawqemuyBmsawwOHZu * 6) * 3) - 4754) * -9) * 7))) + $HPAUgfqkInsquNcv)
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $OSmhCCiVVcvaoDlx = ((((38129 + ((($VnIeYxcKsDXfxF - $feiJBcWxyNQPnmQF) - $BkyEihFJBoLlc))) - (((((7460 - $YTANJGNkttH) - $FetNiyptiqwiiSW) + $FawqemuyBmsawwOHZu) - $uZjFCHCuwgMRmVuD))) - (((($FetNiyptiqwiiSW - $BhnfWCjCT) - 8198) + $uZjFCHCuwgMRmVuD))) - (((53 - -9088) + $DDnVDvxasyZGaH)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $QUsnODxygywaKYx = (((((-33 - 23) + $BkyEihFJBoLlc) * 503) + -908) - ((($FawqemuyBmsawwOHZu - 204260) + 6143)))
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $HPAUgfqkInsquNcv = (((((-22160 + ((((($ljKWwLiwvNQFdMQABBdY * 8893) + $FawqemuyBmsawwOHZu) - -3) * 578018))) * $ejrThZkPCAQIEm) - $WOwGSKBvgxtdHIYcrZdL) - -636201) - ((((($WOwGSKBvgxtdHIYcrZdL * -25501) - -972488) * -7) * 141868)))
                      Source: svchost.exe, 0000000F.00000002.2333436624.0000000003069000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
                      Source: powershell.exe, 00000000.00000002.2357745750.000000000A561000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $SZzxWNxjTVCtBKLGZMHP = ((((((($DDnVDvxasyZGaH * $tFbknODqZPoYEsW) - $aAgxKPHokoeshJGNDq) + 436) - ((((($SNDYinOatvVRp - $xAuYKQHHwEukuiZWRKEXE) * $uZjFCHCuwgMRmVuD) - ((((((-4937 - 4685) - $BDXwthxItR) * $aUvphQevd) * $AAhEbgCCcmlT) * -46))) * $aUvphQevd))) + $gsRwOcOmjjUpCXTcsHn)) * (((((18506 + (((((($TBgUhpZAusN - $tFbknODqZPoYEsW) * 40925) - 623266) * $miiwIudSbQSnYRd) + 690198))) - 86) * $lxbwosjsc) * -310927) + $FawqemuyBmsawwOHZu))
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03100098 LdrInitializeThunk,VirtualFree,14_2_03100098
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_03100277 mov eax, dword ptr fs:[00000030h]14_2_03100277
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_3_029F0283 mov eax, dword ptr fs:[00000030h]15_3_029F0283
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\svchost.exeProcess created / APC Queued / Resumed: C:\Program Files\Google\Chrome\Application\chrome.exe
                      Source: C:\Windows\System32\svchost.exeProcess created / APC Queued / Resumed: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 91.240.118.2 9769
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 2A0884B0000 protect: page read and write
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 241B9960000 protect: page read and write
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: NULL target: C:\Program Files\Google\Chrome\Application\chrome.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: NULL target: C:\Program Files\Google\Chrome\Application\chrome.exe protection: execute and read and write
                      Source: C:\Windows\System32\svchost.exeThread APC queued: target process: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory written: C:\Windows\System32\dllhost.exe base: 2A0884B0000
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory written: C:\Windows\System32\dllhost.exe base: 7FF7C3FA14E0
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory written: C:\Windows\System32\dllhost.exe base: 241B9960000
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeMemory written: C:\Windows\System32\dllhost.exe base: 7FF7C3FA14E0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpnscfg.exe "C:\Program Files\Windows Media Player\wmpnscfg.exe"Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\aXeuKjNXAK.ps1 VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Program Files\Windows Media Player\wmpnscfg.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B6448 CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,19_2_00007DF4111B6448
                      Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: svchost.exe, 0000000F.00000002.2333459642.0000000003100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000F.00000003.2274035533.0000000002DB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000003.2754399709.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000003.2749552874.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2757511608.00000000030D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2278999666.0000000004EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.2921340976.0000000003560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2333635983.0000000003280000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: svchost.exe, 00000013.00000003.2516643294.000001A7A5AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: !CP:Defichain-Electrum
                      Source: svchost.exe, 00000013.00000003.2516643294.000001A7A5AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\ElectronCash\config
                      Source: svchost.exe, 00000013.00000003.2749596190.000001A7A53B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\com.liberty.jaxx
                      Source: svchost.exe, 00000013.00000003.2488857239.000001A7A5AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\Coinomi\Coinomi\wallets
                      Source: powershell.exe, 00000000.00000002.2298501063.0000000007AB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
                      Source: svchost.exe, 00000013.00000002.2751456583.000001A7A52BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live\??\pipe\{efe22a7d-0102-b059-8d52-9be063a132ff}\??\C:\Users\user\AppData\Roaming\1Password\
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\031db23f-f53a-4d6b-b429-cd0302ef56d3
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\6490c938-fe3f-48ae-bc5e-e1986298f7c1
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing Network
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\a5f61848-f128-4a80-965b-a3000feed295
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\affceca8-5877-40b6-92a1-68308b316b66
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\58ef9818-5ea1-49a0-b5b0-9338401a7943
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnWebGPUCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\15702f96-fbc1-4934-99bf-a9a7406c1be7
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons Monochrome
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\discounts_db
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Icons Maskable
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\PALRGUCVEHJump to behavior
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLO
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKN
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJ
                      Source: C:\Windows\System32\svchost.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDI
                      Source: Yara matchFile source: 00000013.00000003.2516897027.000001A7A53B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4868, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0000000F.00000003.2274035533.0000000002DB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000003.2754399709.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000003.2749552874.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2757511608.00000000030D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2278999666.0000000004EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.2921340976.0000000003560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2333635983.0000000003280000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\svchost.exeCode function: 19_2_00007DF4111B6448 CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,19_2_00007DF4111B6448
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts31
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      2
                      Obfuscated Files or Information
                      1
                      OS Credential Dumping
                      13
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Create Account
                      1
                      Extra Window Memory Injection
                      2
                      Software Packing
                      21
                      Input Capture
                      234
                      System Information Discovery
                      Remote Desktop Protocol21
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Scheduled Task/Job
                      712
                      Process Injection
                      1
                      DLL Side-Loading
                      Security Account Manager1
                      Query Registry
                      SMB/Windows Admin Shares21
                      Input Capture
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Scheduled Task/Job
                      1
                      Extra Window Memory Injection
                      NTDS641
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets261
                      Virtualization/Sandbox Evasion
                      SSHKeylogging3
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Modify Registry
                      Cached Domain Credentials2
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                      Virtualization/Sandbox Evasion
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job712
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636393 Sample: aXeuKjNXAK.ps1 Startdate: 12/03/2025 Architecture: WINDOWS Score: 100 80 x.ns.gin.ntt.net 2->80 82 twc.trafficmanager.net 2->82 84 14 other IPs or domains 2->84 106 Suricata IDS alerts for network traffic 2->106 108 Malicious sample detected (through community Yara rule) 2->108 110 Multi AV Scanner detection for submitted file 2->110 112 3 other signatures 2->112 11 powershell.exe 15 22 2->11         started        15 AvastBrowserUpdate.exe 2->15         started        17 notepad.exe 5 2->17         started        19 8 other processes 2->19 signatures3 process4 dnsIp5 94 timing.silver-card-maker.cloud 104.21.35.50, 443, 49717 CLOUDFLARENETUS United States 11->94 130 Found many strings related to Crypto-Wallets (likely being stolen) 11->130 132 Found suspicious powershell code related to unpacking or dynamic code loading 11->132 134 Injects a PE file into a foreign processes 11->134 21 powershell.exe 1 11->21         started        23 conhost.exe 11->23         started        96 ipv4.imgur.map.fastly.net 199.232.192.193 FASTLYUS United States 15->96 136 Switches to a custom stack to bypass stack traces 15->136 25 svchost.exe 15->25         started        signatures6 process7 signatures8 28 svchost.exe 21->28         started        32 WerFault.exe 4 21->32         started        122 System process connects to network (likely due to code injection or exploit) 25->122 124 Query firmware table information (likely to detect VMs) 25->124 126 Checks if the current machine is a virtual machine (disk enumeration) 25->126 128 Tries to detect sandboxes / dynamic malware analysis system (registry check) 25->128 34 svchost.exe 25->34         started        process9 dnsIp10 98 91.240.118.2, 49718, 49732, 49742 GLOBALLAYERNL unknown 28->98 138 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 28->138 140 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 28->140 142 Switches to a custom stack to bypass stack traces 28->142 36 svchost.exe 6 28->36         started        100 ntp1.net.berkeley.edu 169.229.128.134 UCBUS United States 34->100 102 twc.trafficmanager.net 20.101.57.9 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 34->102 104 2 other IPs or domains 34->104 144 Early bird code injection technique detected 34->144 146 Tries to harvest and steal browser information (history, passwords, etc) 34->146 148 Maps a DLL or memory area into another process 34->148 40 chrome.exe 34->40         started        42 msedge.exe 34->42         started        44 chrome.exe 34->44         started        signatures11 process12 dnsIp13 88 ntp.time.nl 94.198.159.10 SIDNNL Netherlands 36->88 90 x.ns.gin.ntt.net 129.250.35.250 NTT-COMMUNICATIONS-2914US United States 36->90 92 5 other IPs or domains 36->92 114 Early bird code injection technique detected 36->114 116 Found many strings related to Crypto-Wallets (likely being stolen) 36->116 118 Maps a DLL or memory area into another process 36->118 120 Queues an APC in another process (thread injection) 36->120 46 wmpnscfg.exe 36->46         started        50 msedge.exe 6 192 36->50         started        53 chrome.exe 36->53         started        59 2 other processes 36->59 55 chrome.exe 40->55         started        57 msedge.exe 42->57         started        signatures14 process15 dnsIp16 70 C:\Users\user\AppData\...\goopdate.dll, PE32 46->70 dropped 72 C:\Users\user\...\AvastBrowserUpdate.exe, PE32 46->72 dropped 150 Writes to foreign memory regions 46->150 152 Allocates memory in foreign processes 46->152 61 dllhost.exe 46->61         started        63 dllhost.exe 46->63         started        86 239.255.255.250 unknown Reserved 50->86 65 msedge.exe 50->65         started        68 chrome.exe 53->68         started        file17 signatures18 process19 dnsIp20 74 chrome.cloudflare-dns.com 162.159.61.3, 443, 49733, 49738 CLOUDFLARENETUS United States 65->74 76 172.64.41.3, 443, 49734, 49735 CLOUDFLARENETUS United States 65->76 78 127.0.0.1 unknown unknown 68->78

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.